WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/792606996

Secure your network for free using Nmap, Wireshark, Snort, Nessus, and MRTG

This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software. * Teachers you how to implement best of breed security using tools for free * Ideal for anyone recomending and implementing new technologies within the company * Companion Web site contains dozens of working scripts and tools.

Open All Close All

http://schema.org/about

http://schema.org/description

  • "This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesn't want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software.* T."
  • "This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software. * Teachers you how to implement best of breed security using tools for free * Ideal for anyone recomending and implementing new technologies within the company * Companion Web site contains dozens of working scripts and tools."
  • "This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software. * Teachers you how to implement best of breed security using tools for free * Ideal for anyone recomending and implementing new technologies within the company * Companion Web site contains dozens of working scripts and tools."@en
  • "This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesn't want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software."@en
  • ""This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools. This is a must have book for any company or person with a limited budget. Network security is in a constant struggle for budget to get things done. Upper management wants thing to be secure but doesnt want to pay for it. With this book as a guide, everyone can get what they want. The examples and information will be of immense value to every small business. It will explain security principles and then demonstrate how to achieve them using only freely available software. * Teachers you how to implement best of breed security using tools for free * Ideal for anyone recomending and implementing new technologies within the company * Companion Web site contains dozens of working scripts and tools" -- OCLC."

http://schema.org/genre

  • "Electronic books"@en
  • "Electronic books"
  • "Livres électroniques"
  • "Ressources internet"
  • "Llibres electrònics"
  • "Software"@en
  • "Software"

http://schema.org/name

  • "Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG"
  • "Secure Your Network for Free"
  • "Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRGT"
  • "Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG. - Includes index"
  • "Secure your network for free using Nmap, Wireshark, Snort, Nessus, and MRTG"@en
  • "Secure your network for free using Nmap, Wireshark, Snort, Nessus, and MRTG"
  • "Secure your network for free : using NMAP, wireshark, snort, nessus, and MRTG"
  • "Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRTG"
  • "Secure your network for free : using Nmap, Wireshark, Snort, Nessus, and MRTG"@en
  • "Secure your network for free"
  • "Secure your network for free using Nmap, Wireshark, Snort, Nessus, and MRGT"
  • "Secure your network for free using Nmap, Wireshark, Snort, Nessus, and MRGT"@en
  • "Secure your network for free using NMAP, wireshark, snort, nessus, and MRTG"@en
  • "Secure your network for free : using nmap, wireshark, snort, nessus, and MRTG"