|
|
|
|
|
Building a VoIP Network with Nortel's Multimedia Communication Server 5100This is the only book you need if you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products. With this book, you'll be able to design, build, secure, and maintaining a cutting-edge converged network... | | Network Security Essentials: Applications and Standards (4th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections... | | Hacking Exposed Cisco NetworksImplement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised... |
|
Mastering Modern Web Penetration Testing
Key Features
-
This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
-
Penetrate and secure your web application using various techniques
-
Get this comprehensive
... | | Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
It is a great pleasure for me to write this foreword about a book that comes out
of one of the first research projects funded by ANR, the French National Research
Agency. ANR was established by the French government in 2005 to fund research
projects, based on competitive schemes giving researchers the best opportunities to
realize... | | Smart Card Handbook
The most comprehensive book on state-of-the-art smart card technology available
Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health... |
|
The Mac Hacker's HandbookAs more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat... | | Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.
Overview
-
Learn how mobile devices are monitored and the impact of cloud computing
... | | Real World Linux Security (2nd Edition)
Stop today's most vicious Internet attackers—right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or... |
|
|
Result Page: 57 56 55 54 53 52 51 50 49 48 47 46 |