3 Best Web Application Firewall (WAF) for 2018

Best Web Application Firewall on March 2024 Shopping Deals at Bestonio.com

  • Web Application Defender's Cookbook: Battling Hackers and Protecting Users

    • ASIN: 1118362187
    • ISBN: 9781118362181
    • Brand: Brand: Wiley
    • Manufacturer: Wiley

    Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credential... [Read More]

  • The Tangled Web: A Guide to Securing Modern Web Applications

    • ASIN: 1593273886
    • ISBN: 1593273886
    • Manufacturer: No Starch Press

    "Thorough and comprehensive coverage from one of the foremost experts in browser security." --Tavis Ormandy, Google Inc.Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes wit... [Read More]

  • ModSecurity Handbook: The Complete Guide to the Popular Open Source Web Application Firewall

    • ASIN: 1907117024
    • ISBN: 1907117024
    • Brand: Brand: Feisty Duck Limited
    • Manufacturer: Feisty Duck Limited

    Please note that this book was last updated in April 2012, even though the ISBN number and the publication date remain the same as for the first edition.ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teac... [Read More]

  • The Best of 2600: A Hacker Odyssey

    • ASIN: 0470294191
    • ISBN: 0470294191
    • Manufacturer: Wiley

    Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine’s writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker’s ... [Read More]

  • Guide to Network Defense and Countermeasures

    • ASIN: 1133727948
    • ISBN: 1133727948
    • Brand: Brand: Cengage Learning
    • Manufacturer: Cengage Learning

    GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and netw... [Read More]

  • Guide to Network Security

    • ASIN: 0840024223
    • ISBN: 0840024223
    • Manufacturer: Cengage Learning

    GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the rol... [Read More]

  • Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

    • ASIN: 1484204581
    • ISBN: 1484204581
    • Manufacturer: Apress

    Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment w... [Read More]

  • BSD Hacks

    • ASIN: 0596006799
    • ISBN: 0596006799
    • Brand: Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

    In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If y... [Read More]

  • Computer Security Literacy: Staying Safe in a Digital World

    • ASIN: 1439856184
    • ISBN: 1439856184
    • Manufacturer: Chapman and Hall/CRC

    Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practica... [Read More]

  • Juniper Networks Secure Access SSL VPN Configuration Guide

    • ASIN: 1597492000
    • ISBN: 1597492000
    • Manufacturer: Syngress

    Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees... [Read More]

  • Hacking Exposed: Malware & Rootkits Secrets & Solutions

    • ASIN: 0071591184
    • ISBN: 0071591184
    • Manufacturer: McGraw-Hill Education

    "A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Projec... [Read More]

  • CEH Certified Ethical Hacker All-in-One Exam Guide

    • ASIN: 0071772294
    • ISBN: 0071772294
    • Manufacturer: McGraw-Hill Osborne Media

    Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions,... [Read More]

  • IMPERVA SF-WAF-X651-SL2 - X6510 Web Application Firewall SoftwareLicense, Annual Premium Support

    • UPC: 190801074543
    • ASIN: B07TYKGL2F
    • Brand: IMPERVA
    • Manufacturer: IMPERVA

    X6510 Web Application Firewall SoftwareLicense, Annual Premium Support

  • The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

    • ASIN: 0849308887
    • ISBN: 9780849308888
    • Brand: Brand: Auerbach Publications
    • Manufacturer: Auerbach Publications

    The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers a... [Read More]

  • Microsoft® ForefrontTM Threat Management Gateway (TMG) Administrator's Companion (Pro -Administrator's Campanion)

    • UPC: 790145263834
    • ASIN: 0735626383
    • ISBN: 0735626383
    • Manufacturer: Microsoft Press

    Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft® Forefront® Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and man... [Read More]

  • Linux Administration: A Beginner's Guide, Fifth Edition

    • ASIN: 0071545883
    • ISBN: 0071545883
    • Manufacturer: McGraw-Hill Osborne Media

    Administer Any Linux Distribution with EaseFully updated for the most current Linux distributions, Linux Administration: A Beginner's Guide, Fifth Edition, shows you how to set up, maintain, and troubleshoot Linux on a single server or an entire network. Get full details on granting user rights and permissions, configuring software and hardware, pr... [Read More]

  • Data and Applications Security XIX: 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (Lecture Notes in Computer Science)

    • ASIN: 354028138X
    • ISBN: 354028138X
    • Brand: Brand: Springer
    • Manufacturer: Springer

    The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was held August 7–10, 2005 at the University of C- necticut in Storrs, Connecticut. The objectives of the working conference were to discuss in depth the current state of the researchand practice in data and - plicationsecurity,enableparticipantstobene?tf... [Read More]

  • Intrusion Detection and Correlation: Challenges and Solutions (Advances in Information Security)

    • ASIN: 0387233989
    • ISBN: 0387233989
    • Manufacturer: Springer

    Details how intrusion detection works in network security with comparisons to traditional methods such as firewalls and cryptography Analyzes the challenges in interpreting and correlating Intrusion Detection alerts

  • Video Conferencing over IP: Configure, Secure, and Troubleshoot

    • UPC: 792502906361
    • ASIN: 1597490636
    • ISBN: 1597490636
    • Brand: Brand: Syngress
    • Manufacturer: Syngress

    This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting tra... [Read More]

  • Cybersecurity Operations Handbook

    • ASIN: B0089NUWM6
    • Manufacturer: Digital Press

    Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity manag... [Read More]

  • 3 Best Web Application Firewall (WAF) for 2018

    What is a Web Application Firewall (WAF)?

    The AWS Web Application Firewall (WAF)