|
|
|
|
|
Intrusion Detection and Correlation: Challenges and SolutionsIntrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and... | | Network Security: A Beginner's Guide, Second EditionEssential Skills--Made Easy!
Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack... | | Guide to Wireless Network SecurityWith the rapid deployment of wireless networks in business environments, IT professionals must implement security mechanisms that are equivalent to those existing today for wire-based networks. This volume is an authoritative, clearly-presented guide to key foundation topics and technology frameworks for designing and maintaining secure,... |
|
A Practical Guide to Trusted ComputingUse Trusted Computing to Make PCs Safer, More Secure, and More Reliable
Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes... | | Maximum Mac OS X SecurityWhile Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.
Yet most Mac OS X books are generally... | | |
|
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |