|
|
|
|
|
Personal Firewalls for Administrators and Remote UsersPersonal firewalls explained—for remote corporate and home users.
In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these... | | Linux Networking Clearly Explained"Bryan Pfaffenberger details the configuration and use of GNOME (as well as Enlightenment and KDE) in greater detail than anyother Linux book out there" David Wall of Amazon.com on Linux Clearly Explained
Bryan Pfaffenberger and Michael Jang bring their focused, step-by-step approach which made Linux... | | REST: From Research to Practice
Anybody following the discussions around “Web Services” in recent years is aware
of the fuzzy definition of the term, and a little bit of history can quite easily explain
some of the confusions around current terminology (or use of terminology). The
general idea of using Web technologies to not only deliver Web pages (HTML... |
|
Juniper SRX Series
Security is one of the fastest moving segments within the realm of technology. Whereas
most technology is created to offer new services or products, security is created to prevent
the abuse of these new products and or services. In today’s world, where we are
always connected in ways that have never been ... | | Computer Network Time Synchronization: The Network Time ProtocolThis book is all about wrangling a herd of network computers so that all display the correct time. This may seem like a really narrow business, but the issues go far beyond winding the clock on your display taskbar. Carefully coordinated, reliable, and accurate time is vital for traffic control in the air and on the ground, buying and selling... | | Cloud Computing and Virtualization
The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of... |
|
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |