Role-Based Access Control, Second Edition Role-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners... Living Well with Parkinson's Glenna Atwood shared her experiences and insights about how
she and her family coped with Parkinson’s disease in the first edition
of Living Well with Parkinson’s.
Her words were educational and inspirational to many people
affected by this intrusion in their life’s plan. Glenna, with Blaine—
How to Cheat at Configuring Open Source Security Tools The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and...
Security on the Web, Volume 83 (Advances in Computers)
This is Volume 83 of the Advances in Computers, subtitled Security on the Web.
This series, continuously published since 1960, is the oldest series covering the
development of the computer industry. With the impact that the World Wide Web
has on every facet of our lives today, this volume focuses on the security aspect of
Network Safety: Network5 Safety Certification
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
Network Security Hacks: Tips & Tools for Protecting Your Privacy
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and...
|Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |