|
|
|
|
|
|
| | Juniper(r) Networks Secure Access SSL VPN Configuration GuideJuniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for... | | |
|
Nokia Firewall, VPN, and IPSO Configuration GuideThe Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its... | | Mastering Autodesk Inventor 2009 and Autodesk Inventor LT 2009Create Full-Featured Digital Prototypes—the Inventor Way
Whether you're designing airplanes, appliances, or industrial machinery, this complete guide to Autodesk Inventor 2009 shows you how to produce and manage build-worthy 3D virtual prototypes. A team of industry professionals and Autodesk developers combines years... | | BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer ... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |