 |
|
 ScreenOS CookbookWritten by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep... |  |  Mainframe Basics for Security Professionals: Getting Started with RACFSecurity—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers... |  |  Oracle Database 11g DBA Handbook (Osborne Oracle Press)The Essential Resource for Oracle DBAs--Fully Updated and Expanded
Manage a flexible, highly available Oracle database with help from the expert information contained in this exclusive Oracle Press guide. Fully revised to cover every new feature and utility, Oracle Database 11g DBA Handbook shows how to perform a new... |
|
 |  |  DHCP Handbook, The (2nd Edition)The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a... |  |  |
|
 Security and Quality of Service in Ad Hoc Wireless NetworksEnsuring secure transmission and good quality of service (QoS) in ad hoc wireless networks are key commercial concerns. Focusing on practical potential solutions, this text covers security and QoS in these networks. Starting with a review of the basic principles of ad hoc wireless networking, coverage progresses to vulnerabilities, and the... |  |  Samba: UNIX and NT InternetworkingThe target audience for this work includes systems programmers and administrators who are looking for assistance in implementing Samba in new and existing Windows and UNIX environments. A basic overview of both UNIX and Windows system and network architectures is provided to assist those readers whose primary background may be in one or the other... |  |  |
|
 Mastering Network SecurityDo you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or... |  |  Java Security (2nd Edition)One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is... |  |  |
|
| Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |