Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
...
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Cisco Security Specialist's Guide to PIX Firewall
Cisco Security Specialist's Guide to PIX Firewall
The objective of this book is to provide you with a thorough understanding of the
Cisco PIX firewalls.Whether you have administrative responsibilities or you are
studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CPSFA),
this comprehensive guide will be of value to you.The initial chapters cover the
basics,
...
The Complete Cisco VPN Configuration Guide
The Complete Cisco VPN Configuration Guide

The definitive guide to building a complete VPN solution with Cisco routers, PIX Firewalls, concentrators, and remote access clients

  • A complete resource for understanding VPN components and VPN design issues

  • Understand state-of-the-art...

Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Next-Generation Network Services
Next-Generation Network Services

A guide to building service-oriented networks to differentiate and grow your business 

  • Understand the changing landscape of the telecommunications industry and what technologies can lead to business and revenue growth

  • Examine the...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Security in an IPv6 Environment
Security in an IPv6 Environment
As the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The...
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Maximize the powerful capabilities of Red Hat Enterprise and Fedora Linux using this
comprehensive and up-to-date reference. You'll get full details on everything from installation and
configuration to system administration and server management of Enterprise Linux-with specifics
on the Linux Kernel 2.6. Thorough security coverage
...
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Demystifying the Ipsec Puzzle (Artech House Computer Security Series)
Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the...
unlimited object storage image
Result Page: 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy