Citrix XenApp Platinum Edition for Windows: The Official Guide
The Authorized Guide to Citrix XenApp Platinum Edition for Windows
Design, deploy, and maintain a virtualized, on-demand enterprise application delivery infrastructure. Citrix XenApp Platinum Edition for Windows: The Official Guide explains how to ensure high availability, enhance productivity, and reduce costs...
Combating Spyware in the Enterprise Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain... Network Security: A Practical Guide (Computer Weekly Professional) Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, from
both an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those...
Building DMZs for Enterprise Networks During the course of the last few years, it has become increasingly evident that there is
a pronounced need for protection of internal networks from the outside world. As
machine technologies have improved and extensive shifts in the functions that a user
can accomplish through more user-friendly interfaces have occurred, many more...
Writing Security Tools and Exploits Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,...
Red Hat Linux Security and Optimization Your Official Red Hat® Linux® Guide to Security and Optimization Reviewed and approved by the experts at Red Hat, this comprehensive guide delivers the know-how you need to improve the performance of your Red Hat Linux system—and protect it from attacks and break-ins. Red Hat Linux expert Mohammed Kabir starts by... Cisco Router Firewall Security
The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches...
Debian 7: System Administration Best Practices
Learn the best ways to install and administer a Debian Linux distribution
An in-depth look at Debian administration subjects
Discover what distinguishes Debian from other Linux distributions
Learn how to install, maintain, and administer Debian Linux
|Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |