 |
|
 Check Point NG VPN-1/Firewall-1: Advanced Configuration and TroubleshootingSecurity of corporate networks has become big business. Many companies are willing to provide hardware, software, consulting, design, and implementation services.The product space is vast, offering many different levels of products that claim to provide all manner of solutions.The problem with the current state of the security space... |  |  |  |  |
|
|
 The Official XMLSPY Handbook"The XMLSPY Handbook is your secret decoder ring to the entire world of XML and XMLSPY® 5." –From the foreword by Alexander Falk, President & CEO, Altova, Inc.
Here’s the only guide sanctioned by the XMLSPY company…
This is it – the only XMLSPY reference book... |  |  J2EE Security for Servlets, EJBs, and Web ServicesJ2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,... |  |  |
|
|
| Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 |