|
|
|
|
Security Sage's Guide to Hardening the Network InfrastructureWith the proliferation of wireless access points (WAPs), virtual private networks (VPNs), and extranets, it’s becoming increasingly difficult to determine where your network begins and ends. Add this complexity to common economic factors, such as company mergers and acquisitions, and now you have a tangled web of... | | Linux on IBM eserver zSeries and S/390: Best Security PracticesThis IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
... | | |
|
|
|
|
|
Result Page: Previous 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Next |