It contains 48 answers, much more than you can imagine; comprehensive answers and extensive details and references, with insights that have never before been offered in print. Get the information you need--fast This all-embracing guide offers a thorough view of key knowledge and detailed insight. This Guide introduces what you want to know about Intrusion-Prevention systems.
A quick look inside of some of the subjects covered: Norton Internet Security - Version 2008 (15.0), Application layer firewall - Network-based application firewalls, Data loss prevention software, Palo Alto Networks - Technology, Rootkit - Behavioral-based, RateBasedIPS, LAMP (software bundle), Symantec - Enterprise software, Check Point Integrity, Deep packet inspection - Background, Intrusion prevention system - Detection methods, Check Point - Acquisitions, Norton Internet Security - Version 2007 (14.0), Outpost Firewall Pro - Versions, Intrusion prevention system - Classifications, Intrusion detection system - Passive and/or reactive systems, Check Point - Products, Unified threat management, CCNA Security -, Payment Card Industry Data Security Standard - Wireless intrusion prevention system (WIPS) implementations, IPFire - System details, Palo Alto Networks - Recognition, Network security - Network security concepts, Comodo Internet Security, Bypass switch, pfSense - Features, Network layer firewall - Third generation: application layer, Host-based intrusion detection system - Monitoring dynamic behavior, Payment Card Industry Data Security Standard - Compliance and wireless LANs, Comodo Internet Security - Components, Palo Alto Networks - History, Unified threat management - How UTM secures the network, Comparison of firewalls - Firewall's other features comparison, and much more...
Or split into 4x interest-free payments of 25% on orders over R50
Learn more
It contains 48 answers, much more than you can imagine; comprehensive answers and extensive details and references, with insights that have never before been offered in print. Get the information you need--fast This all-embracing guide offers a thorough view of key knowledge and detailed insight. This Guide introduces what you want to know about Intrusion-Prevention systems.
A quick look inside of some of the subjects covered: Norton Internet Security - Version 2008 (15.0), Application layer firewall - Network-based application firewalls, Data loss prevention software, Palo Alto Networks - Technology, Rootkit - Behavioral-based, RateBasedIPS, LAMP (software bundle), Symantec - Enterprise software, Check Point Integrity, Deep packet inspection - Background, Intrusion prevention system - Detection methods, Check Point - Acquisitions, Norton Internet Security - Version 2007 (14.0), Outpost Firewall Pro - Versions, Intrusion prevention system - Classifications, Intrusion detection system - Passive and/or reactive systems, Check Point - Products, Unified threat management, CCNA Security -, Payment Card Industry Data Security Standard - Wireless intrusion prevention system (WIPS) implementations, IPFire - System details, Palo Alto Networks - Recognition, Network security - Network security concepts, Comodo Internet Security, Bypass switch, pfSense - Features, Network layer firewall - Third generation: application layer, Host-based intrusion detection system - Monitoring dynamic behavior, Payment Card Industry Data Security Standard - Compliance and wireless LANs, Comodo Internet Security - Components, Palo Alto Networks - History, Unified threat management - How UTM secures the network, Comparison of firewalls - Firewall's other features comparison, and much more...
Imprint | Emereo Publishing |
Country of origin | United States |
Release date | 2014 |
Availability | Supplier out of stock. If you add this item to your wish list we will let you know when it becomes available. |
First published | 2014 |
Authors | Emily Schmidt |
Dimensions | 246 x 189 x 2mm (L x W x T) |
Format | Paperback - Trade |
Pages | 44 |
ISBN-13 | 978-1-4885-2535-3 |
Barcode | 9781488525353 |
Categories | |
LSN | 1-4885-2535-8 |