 |
|
 Zimbra: Implement, Administer and Manage: Get your organization up and running with Zimbra, fastZimbra is open-source server and client software for messaging and collaboration: email, group calendaring, contacts, and web document management and authoring. The Zimbra server is available for Linux, Mac OS X, appliances, and virtualization platforms. The Zimbra Web 2.0 Ajax client runs on Firefox, Safari, and IE, and features easy... |  |  SQL Injection Attacks and DefenseSQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known... |  |  CISA Certified Information Systems Auditor All-in-One Exam Guide"All-in-One is All You Need."
CISA Certified Information Systems Auditor All in One Exam Guide
Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this... |
|
 Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |  |  Securing the Smart Grid: Next Generation Power Grid Security
"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of... |  |  XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
Game consoles have evolved to become complex computer systems that may contain evidence to assist in a criminal investigation. From networking capabilities to chat, voicemail, streaming video and email, the game consoles of today are unrecognizable from complex computer systems. With over 10 million XBOX 360s sold in the United States the... |
|
 |  |  Information Security For The Little Guy
Being secure in an insecure world is a tough nut to crack. There are so
many ways that our personal information can be stolen and duplicated
today it is a very serious situation and should be taken very seriously.
From our surfing the Internet to just the simplicity of speaking on a
cell phone to our friends can... |  |  |
|
|
| Result Page: 10 9 8 7 6 5 4 3 2 1 |