 |
|
|
 Integrating ISA Server 2006 with Microsoft Exchange 2007Everything IT pros need to know about using ISA Server 2006 to defend their companies' email and remote users from hack attacks!
This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time... |  |  Master VISUALLY Microsoft Windows Vista"One picture is worth a thousand words." If you prefer instructions that show you how rather than tell you why, then this intermediate to advanced level reference is for you. Hundreds of succinctly captioned, step-by-step screen shots reveal how to accomplish more than 200 Windows Vista tasks, including:
... |  |  2600: The Hacker Quarterly, Summer 20022600: The Hacker Quarterly, Summer 2002:
2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as... |
|
|
 Open Source E-mail Security (Kaleidoscope)In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping... |  |  Building Firewalls with OpenBSD and PF, 2nd EditionWritten by Jacek Artymiak, a frequent contributor to ONLamp.com, Building Firewalls with OpenBSD and PF is the first and only print publication devoted solely to the subject of the pf packet filter used in OpenBSD, FreeBSD, and NetBSD operating systems. Topics covered include: firewall design, ruleset syntax, packet normalization (scrubbing),... |  |  Security in an IPv6 EnvironmentAs the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The... |
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |