 |
|
|
|
 |  |  VMware View Security Essentials
Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering... |  |  Deploying Voice over Wireless LANs (Networking Technology)
The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions
Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly... |
|
|
 Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd EditionFreeBSD—the powerful, flexible, and free Unix-like operating system—is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.
Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas... |  |  Mastering Windows Network Forensics and InvestigationConduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this... |  |  |
|
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |