Lendle

Cover Book Actions
Third Rainbow - J M K McMullen
 

Third RainbowJ M K McMullen

Average wait: N/A

Beta Masterson is having trouble sleeping. So much so that he can barely function in his waking life. The firewall program he designed to keep his nightmares at bay isn’t working anymore, and the demons that haunt his bad dreams have begu… more

Third Rainbow
J M K McMullen
J M K McMullen , English
Flawless Computing:How To Ke... - John Bridges
 

Flawless Computing:How To Ke...John Bridges

I told my wife “you cannot hurt this machine.” I was talking about our home machine, and she was nervous,  because she knows I use that machine for work, and she is a novice.  She believes me now, because it is true.  My granddaughter play… more

Flawless Computing:How To Keep Your Computer Working Perfectly
John Bridges
AuthorHouse , English
The Essential Guide to Inter... - Michael Nickle
 

The Essential Guide to Inter...Michael Nickle

Average wait: N/A

Computer security is a complex topic, especially for those who aren’t IT professionals. This book offers a clear and easy-to-understand approach to Windows security risks and attacks for PC users. By boiling down the topic to just the esse… more

The Essential Guide to Internet Security for Windows 7 & Windows XP
Michael Nickle
English
Intrusion Prevention and Act... - Michael Rash, Angela Orebaug...
 

Intrusion Prevention and Act...Michael Rash, Angela Orebaug...

This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response techn… more

Intrusion Prevention and Active Response: Deploying Network and Host IPS
Michael Rash, Angela Orebaugh, Graham Clark
Syngress , English
Book Of Poetry: Haiku Poetry... - James Moore
 

Book Of Poetry: Haiku Poetry...James Moore

Experience Haiku through the eyes of an African American male from the city of Chicago. Get an urban spin on the traditional Japanese style of poetry as he sees it. Complete with 18 poems this book includes: My WifeDeadly SinFirewallDepres… more

Book Of Poetry: Haiku Poetry (2nd Edition)
James Moore
English
Children of the Great Reckon... - K.B. Nelson
 

Children of the Great Reckon...K.B. Nelson

Average wait: N/A

Welcome to a world controlled by the great Spirit and Science Margas, a world that has crawled out of years of devastating viral plagues only to find that the immuno-nanotech sentinels meant to protect and enhance a whole generation of chil… more

Children of the Great Reckoning, Firewall, Book 1
K.B. Nelson
Karunajoyti Publications , English
The Law Of Repulsion!: for w... - Robert Loxley
 

The Law Of Repulsion!: for w...Robert Loxley

Average wait: N/A

The Law Of Repulsion; For when the Law of Attraction seems to work in reverse, A Sorcerers perspective!

Manifest Like A Sorcerer!

Do you find LOA (Law of Attraction) and manifestation techniques you attempt produce opposite effects to the… more

The Law Of Repulsion!: for when the Law of Attraction seems to work in reverse. A Sorcerers Perspective!
Robert Loxley
Electronic Pulp Books , English
Firewall Hacking Secrets For... - Timur Mehmet
 

Firewall Hacking Secrets For...Timur Mehmet

Average wait: N/A

Firewall hacking secrets for security professionals enables both penetration testers and security professionals to plan and execute better testing of firewalls.

Unlike most ‘hacking’ books, we discuss all aspects of testing a firewall cove… more

Firewall Hacking Secrets For Security Professionals (HackerStorm Penetration Testing Guides Book 1)
Timur Mehmet
HackerStorm.com Publishing , English
Hacker: The Outlaw Chronicles - Ted Dekker
 

Hacker: The Outlaw ChroniclesTed Dekker

Average wait: 52d, 0h

My name is Nyah and I’m a hacker. I know things most people would never believe. Things that shouldn’t exist, but do.

Seventeen year old Nyah Parks is a genius hacker who makes a living by cracking the firewalls of the world’s largest cor… more

Hacker: The Outlaw Chronicles
Ted Dekker
Outlaw Studios , English
Take Control of Sharing File... - Glenn Fleishman
 

Take Control of Sharing File...Glenn Fleishman

This detail-packed book makes file sharing easy, whether it’s between two Macs on a local network, among a mixed-platform office workgroup, or between far-flung computers on the Internet. You’ll get help with selecting and configuring the r… more

Take Control of Sharing Files in Snow Leopard
Glenn Fleishman
TidBITS Publishing, Inc. , English
Emergency Responder Communic... - Brian Walsh
 

Emergency Responder Communic...Brian Walsh

Average wait: N/A

As a professional emergency responder you are well trained to handle an extensive array of crises. Your tense and stressful work environment can cause depersonalization of casualties and victims, with potentially negative consequences. This… more

Emergency Responder Communication Skills Handbook: How Your Words and Actions Affect People in Medical Distress
Brian Walsh
Walsh Seminars , English
Critical Safety Measures For... - Todd M. Wright
 

Critical Safety Measures For...Todd M. Wright

The internet is a haven for many forms of risks and hazards. There is the never-ending danger of identity fraud. There is the threat of viruses and other deliberately harmful malwares that can cause data loss. How can you feel safe while us… more

Critical Safety Measures For Your Computer: The Ultimate Collection Of Computer Protection Tips For Data Recovery And Virus Protection For Your Laptop … Of Mind From Other Internet Security Threats
Todd M. Wright
English
Fighting Lady Jayne - Michelle M. Pillow
 

Fighting Lady JayneMichelle M. Pillow

The second Divinity Warriors book, set in the Divinity Universe.Jayne Hart has earned her independence by becoming Divinity Corporation’s inter-dimensional boxing champion. Life is great, until a dirty fighter knocks her unconscious. Now, a… more

Fighting Lady Jayne
Michelle M. Pillow
Ellora’s Cave , English
All About Spam Protecteion ! - Alexander Marriot
 

All About Spam Protecteion !Alexander Marriot

Essential: All About Spam ProtectionA collection of selected reports - A Brief History of Spam Top 10 Techniques to Protect Yourself From Spam Top Ten Tricks of the Spammer What Can an Anti spam Firewall Do For You … more

All About Spam Protecteion !
Alexander Marriot
English
Fighting Lady Jayne (Divinit... - Michelle M. Pillow
 

Fighting Lady Jayne (Divinit...Michelle M. Pillow

2 ratings
Average wait: 12h

Divinity Warriors 2: Fighting Lady JayneSeries One of the Divinity UniverseAlternate Reality Romance / Parallel UniverseJayne Hart has earned her independence by becoming Divinity Corporation’s inter-dimensional boxing champion. Life is gre… more

Fighting Lady Jayne (Divinity Warriors Book 2)
Michelle M. Pillow
The Raven Books , English
Cisco ASA and PIX Firewall Handbook - David Hucaby
 

Cisco ASA and PIX Firewall HandbookDavid Hucaby

The complete guide to the most popular Cisco PIX®, ASA, FWSM, and IOS® firewall security features Learn about the various firewall models, user interfaces, feature sets, and configuration methods Understand how a Cisco firewall inspect… more

Cisco ASA and PIX Firewall Handbook
David Hucaby
Cisco Press , English
Appearances: Genetic Mytholo... - Laurie McRobert
 

Appearances: Genetic Mytholo...Laurie McRobert

Average wait: N/A

In Appearances: Genetic Mythology and Cosmic Instincts Laurie McRobert argues that the theoretical physicists’ concepts of the cosmos need to be replaced by a biological cosmology. This revolutionary perspective brings with it the claim tha… more

Appearances: Genetic Mythology and Cosmic Instincts
Laurie McRobert
Createspace , English
Cisco ASA Firewall using AAA... - Grant Wilson
 

Cisco ASA Firewall using AAA...Grant Wilson

Average wait: N/A

In this lab I will be configuring the Cisco ASA to authenticate, authorize and account users accessing the firewall. This will be done using the CLI of the ASA.

Requirements of the lab: -Authenticate SSH, HTTPS and console access to the AAmore

Cisco ASA Firewall using AAA and ACS - ASA 9.1 (Cisco Pocket Lab Guides Book 3)
Grant Wilson
Pickenfield Publishing , English
Penetration Testing: Communi... - Deborah Morley
 

Penetration Testing: Communi...Deborah Morley

The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this program is designed to expose the reader t… more

Penetration Testing: Communication Media Testing, 1st Ed.: 4 (E/Csa)
Deborah Morley
Delmar Learning , English
Configuring SonicWALL Firewalls - Chris Lathem, Benjamin W. Fo...
 

Configuring SonicWALL FirewallsChris Lathem, Benjamin W. Fo...

SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annua… more

Configuring SonicWALL Firewalls
Chris Lathem, Benjamin W. Fortenberry, Joshua Reed, Kevin Lynn, Daniel H. Bendell
Syngress , English