 |
|
|
 OS X Exploits and DefenseLong believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.
Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an... |  |  Microsoft Office SharePoint Server 2007 Best PracticesGet field-tested best practices and proven techniques for designing, deploying, operating, and optimizing Microsoft Office SharePoint Server 2007 and Windows SharePoint Services 3.0. Part of the new Best Practices series for IT professionals from Microsoft Press®, this guide is written by leading SharePoint MVPs and Microsoft SharePoint... |  |  Current Issues in Knowledge Management (Premier Reference Source)As global enterprise grows increasingly reliant on electronic data, processes, and procedures, studies of the management of organizational knowledge are emergin at the forefront of critical research.
Current Issues in Knowledge Management combines cutting-edge research on the cultural, technical, organizational, and human... |
|
 The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... |  |  |  |  Wireless Security Essentials: Defending Mobile Systems from Data PiracyProtect your wireless systems from attack with this clear-cut guide on how to implement proven security methodologies Effective security is the most important element now missing from most wireless networks. Vulnerabilities in these networks leave them open to eavesdropping, session highjacking, data alteration and manipulation,... |
|
 |  |  The Best Damn Windows Server 2008 Book Period, Second EditionIn depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.
The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to... |  |  Security MonitoringHow well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic... |
|
| Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |