|
|
|
|
|
|
LANs to WANs: The Complete Management GuideThis text addresses key network management challenges, showing professionals how to tie together incompatible LANs, meld legacy systems and LANs, extend the reach of LANs with wireless links, and protect information assets from various disaster scenarios.
Empowered by today’s high-performance computers interconnected over LANs and... | | Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... | | Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
|
|
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 |