|
|
|
|
|
|
Trust and Security in Collaborative Computing (Computer and Network Security)Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group... | | Fires in Silos: Hazards, Prevention, and Fire FightingStorage of chemicals in silos is ubiquitous in the chemical, pharmaceutical and other producing industries, and some 80 % of all bulk materials are inflammable. It is here that the risk of large fires arises due to self-ignition or the intrusion of different ignition sources. For firefighters, most silo fires are very difficult to handle due to the... | | Maximum Windows 2000 Security (Maximum Security)Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.
Topics include:
Physical & File System Security,
Password Security,
Malicious Code,
Windows 2000 Network Security Architecture and Professional... |
|
Snort 2.0 Intrusion Detection“Intruder Alert! Intruder Alert! Warning,Will Robinson!” When we heard that ominous announcement emanating from a robot as it twisted and turned with arms thrashing and head spinning, we sat galvanized to our televisions waiting for the intruder to reveal itself.Would this be the end of Will Robinson, as we knew him? ... | | | | Practical Internet SecurityAs organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external... |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |