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
W3siaWQiOiJhZHN0X2JfTV8zMDB4NTAiLCJhZHNwb3QiOiJiX01fMzAweDUwIiwid2VpZ2h0IjoiNSIsImZjYXAiOmZhbHNlLCJzY2hlZHVsZSI6ZmFsc2UsIm1heFdpZHRoIjoiNzY4IiwibWluV2lkdGgiOmZhbHNlLCJ0aW1lem9uZSI6ZmFsc2UsImV4Y2x1ZGUiOmZhbHNlLCJkb21haW4iOmZhbHNlLCJjb2RlIjoiPHNjcmlwdCB0eXBlPVwidGV4dFwvamF2YXNjcmlwdFwiPlxyXG4gIGF0T3B0aW9ucyA9IHtcclxuICAgICdrZXknIDogJzdkMWNjMGUxYjk4MWM5NzY4ZGI3ODUxZmM1MzVhMTllJyxcclxuICAgICdmb3JtYXQnIDogJ2lmcmFtZScsXHJcbiAgICAnaGVpZ2h0JyA6IDUwLFxyXG4gICAgJ3dpZHRoJyA6IDMyMCxcclxuICAgICdwYXJhbXMnIDoge31cclxuICB9O1xyXG4gIGRvY3VtZW50LndyaXRlKCc8c2NyJyArICdpcHQgdHlwZT1cInRleHRcL2phdmFzY3JpcHRcIiBzcmM9XCJodHRwJyArIChsb2NhdGlvbi5wcm90b2NvbCA9PT0gJ2h0dHBzOicgPyAncycgOiAnJykgKyAnOlwvXC93d3cuYm5odG1sLmNvbVwvaW52b2tlLmpzXCI+PFwvc2NyJyArICdpcHQ+Jyk7XHJcbjxcL3NjcmlwdD4ifV0=
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
01 - There Be Hackers Here/020 - The Process of an Attack.pdf
940.25KB
01 - There Be Hackers Here/021 - Where are Attacks Coming From.pdf
327.52KB
01 - There Be Hackers Here/024 - Network Security Organizations.pdf
168.96KB
01 - There Be Hackers Here/023 - Overview of Common Attacks and Exploits.pdf
162.61KB
01 - There Be Hackers Here/022 - Common Vulnerabilities, Threats, Risks.pdf
162.5KB
01 - There Be Hackers Here/018 - Targets of Opportunity.pdf
159.13KB
01 - There Be Hackers Here/019 - Targets of Choice.pdf
129.62KB
01 - There Be Hackers Here/016 - Essentials First Looking for a Target.pdf
121.85KB
01 - There Be Hackers Here/015 - There be Hackers Here.pdf
107.84KB
01 - There Be Hackers Here/017 - Hacking Motivations.pdf
106.94KB
01 - There Be Hackers Here/026 - Chapter Review.pdf
82.22KB
01 - There Be Hackers Here/025 - Chapter Summary.pdf
72.84KB
02 - Security Policies/027 - Security Policies.pdf
524.21KB
02 - Security Policies/029 - Corporate Policies and Trust.pdf
288.34KB
02 - Security Policies/033 - Wireless Communication Policy.pdf
201.26KB
02 - Security Policies/030 - Acceptable Use Policy.pdf
199.15KB
02 - Security Policies/031 - Password Policy.pdf
175.48KB
02 - Security Policies/028 - Responsibilities and Expectations.pdf
175.08KB
02 - Security Policies/034 - Extranet Connection Policy.pdf
160.62KB
02 - Security Policies/032 - Virtual Private Network (VPN) Security Policy.pdf
152.96KB
02 - Security Policies/036 - Industry Standards.pdf
148.79KB
02 - Security Policies/035 - ISO Certification Policy.pdf
134.42KB
02 - Security Policies/038 - Chapter Review.pdf
98.71KB
02 - Security Policies/037 - Chapter Summary.pdf
74.68KB
03 - Processes and Procedures/040 - Security Advisories and Alerts Getting the Intel You Need to Stay Safe.pdf
320.85KB
03 - Processes and Procedures/041 - Industry Best Practices.pdf
182.51KB
03 - Processes and Procedures/039 - Processes and Procedures.pdf
106.14KB
03 - Processes and Procedures/042 - Summary.pdf
86.59KB
03 - Processes and Procedures/043 - Chapter Review and Questions.pdf
81.4KB
04 - Network Security Standards and Guidelines/049 - Microsoft Security.pdf
328.53KB
04 - Network Security Standards and Guidelines/047 - Cisco Best Practice Overview and Guidelines.pdf
280.34KB
04 - Network Security Standards and Guidelines/046 - Cisco Validated Design Program.pdf
151.2KB
04 - Network Security Standards and Guidelines/048 - NSA Security Configuration Guides.pdf
141.81KB
04 - Network Security Standards and Guidelines/044 - Network Security Standards and Guidelines.pdf
109.81KB
04 - Network Security Standards and Guidelines/051 - Chapter Link Toolbox Summary.pdf
102.55KB
04 - Network Security Standards and Guidelines/045 - Cisco SAFE2.0.pdf
96.33KB
04 - Network Security Standards and Guidelines/050 - Chapter Summary.pdf
71.63KB
05 - Overview of Security Technologies/062 - Two-Factor Authentication - Multifactor Authentication.pdf
1.71MB
05 - Overview of Security Technologies/053 - Security First Design Concepts.pdf
1.03MB
05 - Overview of Security Technologies/060 - Reputation Based Security.pdf
269.65KB
05 - Overview of Security Technologies/054 - Packet Filtering via ACLs.pdf
262.63KB
05 - Overview of Security Technologies/056 - Network Adress Translation (NAT).pdf
220.86KB
05 - Overview of Security Technologies/055 - Stateful Packet Inspection.pdf
210.12KB
05 - Overview of Security Technologies/061 - AAA Technologies.pdf
209.21KB
05 - Overview of Security Technologies/057 - Proxies and Application-Level Protection.pdf
204.38KB
05 - Overview of Security Technologies/058 - Content Filters.pdf
168.58KB
05 - Overview of Security Technologies/059 - Public Key Infrastructure.pdf
149.37KB
05 - Overview of Security Technologies/052 - Overview of Security Technologies.pdf
106.4KB
05 - Overview of Security Technologies/064 - Chapter Review Questions.pdf
77.66KB
05 - Overview of Security Technologies/063 - Chapter Summary.pdf
72.7KB
06 - Security Protocols/073 - SNMP v3.pdf
699.94KB
06 - Security Protocols/072 - Secure Shell (SSH).pdf
658.29KB
06 - Security Protocols/071 - Layer 2 Tunneling Protocol (L2TP).pdf
305.42KB
06 - Security Protocols/070 - Point-to-Point Tunneling Protocol (PPTP).pdf
157.66KB
06 - Security Protocols/068 - Message Digest 5 Algorithm.pdf
146.65KB
06 - Security Protocols/066 - Triple DES Encryption.pdf
142.38KB
06 - Security Protocols/065 - Security Protocols.pdf
133.05KB
06 - Security Protocols/069 - Secure Hash Algorithm (SHA Hash).pdf
132.9KB
06 - Security Protocols/067 - Advanced Encryption Standard (AES).pdf
103.89KB
06 - Security Protocols/075 - Chapter Review Questions.pdf
76.26KB
06 - Security Protocols/074 - Chapter Summary.pdf
71.03KB
07 - Firewalls/080 - Firewall Operational Overview.pdf
269.44KB
07 - Firewalls/082 - Case Studies.pdf
232.96KB
07 - Firewalls/077 - Firewall Frequently Asked Questions.pdf
213.9KB
07 - Firewalls/078 - Firewalls are the Security Policy.pdf
172.76KB
07 - Firewalls/081 - Essentials First Life in the DMZ.pdf
142.57KB
07 - Firewalls/076 - Firewalls.pdf
128.48KB
07 - Firewalls/079 - We Do Not Have a Security Policy.pdf
90.51KB
07 - Firewalls/083 - Firewall Limitations.pdf
82.48KB
07 - Firewalls/084 - Chapter Summary.pdf
79.25KB
07 - Firewalls/085 - Chapter Review Questions.pdf
73.59KB
08 - Router Security/090 - Secure IOS Templates.pdf
357KB
08 - Router Security/087 - Edge Router as a Choke Point.pdf
324.8KB
08 - Router Security/091 - Routing Protocol Security.pdf
210.03KB
08 - Router Security/086 - Router Security.pdf
205.86KB
08 - Router Security/088 - Routers Running Zone Based Firewall.pdf
199.38KB
08 - Router Security/089 - Intrusion Detection With Cisco IOS.pdf
198.76KB
08 - Router Security/092 - Chapter Summary.pdf
108.66KB
08 - Router Security/093 - Chapter Review Questions.pdf
75.97KB
09 - IPsec Virtual Private Networks (VPN)/097 - Overview of IPsec VPNs.pdf
617.26KB
09 - IPsec Virtual Private Networks (VPN)/096 - VPN Overview.pdf
299.58KB
09 - IPsec Virtual Private Networks (VPN)/103 - Remote-Access VPN Security Considerations.pdf
262.82KB
09 - IPsec Virtual Private Networks (VPN)/098 - Router Configuration as VPN Peer.pdf
233.73KB
09 - IPsec Virtual Private Networks (VPN)/099 - Firewall VPN Configuration for Client Access.pdf
209.08KB
09 - IPsec Virtual Private Networks (VPN)/100 - SSL VPN Overview.pdf
190.13KB
09 - IPsec Virtual Private Networks (VPN)/101 - Comparing SSL and IPsec VPNs.pdf
186.56KB
09 - IPsec Virtual Private Networks (VPN)/095 - VPNs Securely Connect is LANds.pdf
148.07KB
09 - IPsec Virtual Private Networks (VPN)/094 - IPsec Virtual Private Networks (VPN).pdf
141.32KB
09 - IPsec Virtual Private Networks (VPN)/102 - Which to Deploy Choosing Between IPsec and SSL VPNs.pdf
139.41KB
09 - IPsec Virtual Private Networks (VPN)/105 - Chapter Review Questions.pdf
76.68KB
09 - IPsec Virtual Private Networks (VPN)/104 - Chapter Summary.pdf
71.47KB
10 - Wireless Security/110 - Wireless Threats.pdf
829.32KB
10 - Wireless Security/107 - Essentials First Wireless LANs.pdf
559.38KB
10 - Wireless Security/113 - Essentials First Wireless Hacking Tools.pdf
274.28KB
10 - Wireless Security/109 - WarGames Wirelessly.pdf
241.53KB
10 - Wireless Security/108 - Wireless Networking.pdf
194.78KB
10 - Wireless Security/111 - Extensible Authentication Protocol (EAP).pdf
140.94KB
10 - Wireless Security/106 - Wireless Security.pdf
131.07KB
10 - Wireless Security/112 - Essential Wireless Security.pdf
127.5KB
10 - Wireless Security/114 - Chapter Summary.pdf
92.26KB
10 - Wireless Security/115 - Chapter Review Questions.pdf
73.92KB
11 - Intrusion Detection and Honeypots/118 - How are Intrusions Detected.pdf
1000.79KB
11 - Intrusion Detection and Honeypots/117 - Essentials First Intrusion Detection.pdf
465.48KB
11 - Intrusion Detection and Honeypots/119 - Essentials First Honeypots.pdf
162.98KB
11 - Intrusion Detection and Honeypots/116 - Intrusion Detection and Honeypots.pdf
140.09KB
11 - Intrusion Detection and Honeypots/121 - Chapter Review Questions.pdf
73.71KB
11 - Intrusion Detection and Honeypots/120 - Chapter Summary.pdf
66.93KB
12 - Tools of the Trade/125 - Security Scanners.pdf
926.42KB
12 - Tools of the Trade/123 - Essentials First Vulnerability Analysis.pdf
309.01KB
12 - Tools of the Trade/124 - Security Assessments and Penetration Testing.pdf
186.94KB
12 - Tools of the Trade/126 - COREIMPACT Pro.pdf
167.84KB
12 - Tools of the Trade/122 - Tools of the Trade.pdf
142.9KB
12 - Tools of the Trade/128 - Chapter Review Questions.pdf
72.11KB
12 - Tools of the Trade/127 - Chapter Summary.pdf
69.94KB
000 - Front Page.pdf
269.07KB
008 - Contents.pdf
249.73KB
129 - Appendix A - Answers to Review Questions.pdf
221.93KB
002 - Authors.pdf
114.31KB
014 - How This Book is Organized.pdf
113.33KB
003 - About the Authors.pdf
110.26KB
006 - Acknowledgements.pdf
83.3KB
005 - Dedications.pdf
82.54KB
004 - About the Technical Reviewers.pdf
82.44KB
007 - Contents at a Glance.pdf
75.2KB
013 - Who Should Read This Book.pdf
75.05KB
010 - Command Syntax Conventions.pdf
72.41KB
011 - Introduction.pdf
72.29KB
012 - Goals and Methods.pdf
69.57KB
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