|
|
|
|
VMware View Security Essentials
Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering... | | Deploying Voice over Wireless LANs (Networking Technology)
The definitive guide to planning, architecting, deploying, supporting, and creating Voice over Wireless LAN solutions
Recent advances make it possible to deliver high-quality voice and video communications over a wireless LAN (WLAN), replacing costly... | | Wi-Foo : The Secrets of Wireless Hacking The definitive guide to penetrating and defending wireless networks.
Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any... |
|
|
Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd EditionFreeBSD—the powerful, flexible, and free Unix-like operating system—is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.
Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas... | | Security+ Study GuideOver 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides
The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test... | | Mastering Windows Network Forensics and InvestigationConduct Cutting-Edge Forensic Investigations of Computer Crimes.
Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.
Now you can get the training you need in this... |
|
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |