|
|
|
|
Configuring Symantec AntiVirus Corporate EditionAt some time in the last 15 years many of us blinked, and upon opening our eyes we found the world on the verge of becoming one large network. Public and private networks were interconnected both far and near, and now in your corner of this interconnected puzzle, virus protection for the network has become your... | | Programming Lego Mindstorms with Java (With CD-ROM)Soon after its release, the LEGO MINDSTORMS Robotics Invention System (RIS) quickly became popular not only with its initial intended audience of children aged 11 and up, but also within a community of adult LEGO robotics enthusiasts that developed and spread worldwide with significant help from the Internet. Before long, hackers had deciphered the... | | Hacking a Terror Network: The Silent Threat of Covert ChannelsFrom a counterterrorism perspective, discovering terrorist communication networks and methods is extremely important.Terrorists have demonstrated the capability to exchange messages that vary from archaic (using human couriers) to technologically advanced using “virtual dead-drops.”The popular press is full of... |
|
Check Point NG VPN-1/Firewall-1: Advanced Configuration and TroubleshootingSecurity of corporate networks has become big business. Many companies are willing to provide hardware, software, consulting, design, and implementation services.The product space is vast, offering many different levels of products that claim to provide all manner of solutions.The problem with the current state of the security space... | | How to Cheat at Managing Windows Small Business ServerYou’re holding this book in your hands at the local bookstore, or maybe viewing it online. Better yet, you’re sitting at your desk with a cup of coffee looking at this foreword.You’re wondering if you bought the right book.
You’re probably expecting to find some serious shortcuts to managing ... | | Wireless Hacking: Projects for Wi-Fi Enthusiasts
Welcome to the world of “wireless magic.” 802.11 (Wi-Fi) wireless LANs have exploded onto the scene with an excitement not seen since the introduction of the Internet itself. Getting rid of the wires means getting rid of the hassle.With Wi-Fi, you can roam through your favorite coffee shop, boardroom or living room, all the while... |
|
Hack Proofing Your IdentityThe use of a seal, card, or other identification while making a purchase or signing a contract is a custom almost as old as history. As merchants and their customers have begun using the Internet in recent years to conduct business online, they have been challenged to find digital forms of identification that mimic traditional, ... | | Special Ops: Host and Network Security for Microsoft, UNIX, and OracleAs “techies,” we embrace the ability to understand the technology behind how and why things work, to a point beyond most other people’s interest. Usually what drives our interest is curiosity, a curiosity very similar to that which we experienced in childhood.
Curiosity comes in different shapes and sizes... | | Configuring Sonicwall FirewallsEvery enterprise requires at least one firewall to provide the backbone for its network security architecture. Firewalls are the core component of your network’s security. The risks today have greatly increased, so the call for a stronger breed of firewall has been made. In the past, simple packet-filtering firewalls allowing... |
|
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |