|
|
|
|
A Practical Guide to Trusted ComputingUse Trusted Computing to Make PCs Safer, More Secure, and More Reliable
Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes... | | IT Disaster Recovery Planning For Dummies (Computer/Tech)Create a safety net while you work out your major plan
Identify critical IT systems, develop a long-range strategy, and train your people
Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back... | | HackNotes(tm) Network Security Portable ReferenceHackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted... |
|
|
| | | | Asterisk HackingAsterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all... |
|
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 |