|
|
|
|
|
CompTIA Security+ All-in-One Exam Guide, Second EditionA CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One
Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of... | | JUNOS OS For Dummies (Computer/Tech)
Welcome to Junos OS For Dummies. This book provides you with a handy reference for configuring and running Junos software on Juniper Networks products. (We won’t bore you with how Junos got here, but you can discover more about Juniper Networks and the evolution of Junos software at www.juniper.net/company.)
... | | |
|
Inside Microsoft Windows SharePoint Services 3.0 (Pro Developer)Get in-depth architectural insights for building enterprise solutions-straight from the experts.
Focus is on the internals of the Windows SharePoint Services 3.0 platform with this in-depth, straightforward reference. You get expert insights, task-oriented guidance, and extensive code samples to help you master the intricacies of... | | Real 802.11 Security: Wi-Fi Protected Access and 802.11i"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards." -Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC
"This... | | DB2 UDB V8.1 Certification Exam 700 Study GuideIBM DB2 Universal Database Certification gives you a powerfuladvantage in the marketplace for expertise on the world’s #1enterprise database platform. Passing IBM DB2 UDB V8.1 FamilyFundamentals Exam 700 earns you the IBM Certified Database Associatecertification and is the prerequisite for all intermediate and... |
|
Getting Started with FortiGate
This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.
Overview
-
Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of...
| | Hacking the Code: ASP.NET Web Application SecurityThis unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of... | | Professional Plone DevelopmentThis book teaches Plone development best practices, focusing on Plone 3.0. It covers setting up a development environment, customizing Plone's look and feel, creating new content types and forms, connecting to external databases, managing users and groups intelligently, configuring a production-ready server, LDAP authentication, and caching. Aimed... |
|
|
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 |