 |
|
|
|
|
|
 Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |  |  Network Security FundamentalsCompanies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise... |  |  Securing & Optimizing Linux: The Hacking SolutionThis 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system... |
|
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |