 |
|
 Enhancing Computer Security with Smart TechnologyThis book is about enhancing computer security through smart technology. This is compiled with the intention of bringing together two groups of people: those coming from a computer security background and those from an artificial intelligence and machine learning background. Toward this objective, this book is organized into two parts. The first... |  |  |  |  |
|
 |  |  Sleeping with the Enemy: Running Windows® on a Mac®Sleeping with the Enemy: Running Windows on a Mac provides the information Mac users need to understand the options for running Windows on a Mac and to choose the best fit for them. It includes detailed information on installing, configuring, and using both kinds of Windows environments. Important... |  |  Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
- Learn about the various firewall models, user interfaces,
... |
|
|
|
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 |