 |
|
 Information Security Management Handbook, Sixth Edition (Isc2 Press)A comprehensive compilation of the fundamental knowledge, skills, techniques, and tools required by all information technology professionals, Information Security Management Handbook, Sixth Edition features new developments in information security and the Common Body of Knowledge. It contains new information on identity management, intrusion... |  |  Active and Programmable Networks for Adaptive Architectures and ServicesNew applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,... |  |  |
|
|
 |  |  Mac OS X Server 10.4 Tiger: Visual QuickPro GuideOffering Apple's legendary ease of use plus everything you would expect from a Unix-based operating system--preemptive multitasking, symmetric multiprocessing, and support for networking and security standards--Mac OS X Server has revolutionized the world of network administration. Mac OS X Tiger server continues that tradition by offering more... |  |  How the Internet Works (8th Edition)Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the... |
|
|
| Result Page: 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 138 |