|
|
|
|
|
|
Snort for DummiesFind out how to foil an attack on your network
Choose the right way to deploy and configure Snort — no experience required!
Who knows what evil is poking around your network perimeter? Snort will sniff out worms, system crackers, and other bad guys, and this friendly guide helps you... | | Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,... | | Microsoft Windows Identity Foundation Cookbook
I still remember sitting down with my brand new copy of Writing Secure Code by Michael
Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web
reports, (before the term "Bl" came to embody what at the time we thought was an incredibly
innovative way to display call center metrics for managing... |
|
|
|
Result Page: 9 8 7 6 5 4 3 2 1 |