 |
|
 Professional IIS 7Windows Server 2008 is the first update to Microsoft’s server operating system in nearly five years, and among the major changes is the new Internet Information Services 7.0, which probably marks the biggest departure from previous IIS versions that we have ever seen.
Previous recent releases of IIS have concentrated on improving... |  |  Auditing and Security: AS/400, NT, UNIX, Networks, and Disaster Recovery PlansA complete and definitive guide to auditing the security of IT systems for managers, CIOs, controllers, and auditors
This up-to-date resource provides all the tools you need to perform practical security audits on the entire spectrum of a company's IT platforms-from the mainframe to the individual PC-as well as the networks that connect... |  |  Cisco Secure Firewall Services Module (FWSM)
By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.
The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either... |
|
 C: An advanced introduction (Principles of computer science series)The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons... |  |  Robot Modeling and ControlRobotics is a relatively young field of modern technology that crosses traditional engineering boundaries. Understanding the complexity of robots and their applications requires knowledge of electrical engineering, mechanical engineering, systems and industrial engineering, computer science, economics, and mathematics. New disciplines of... |  |  |
|
|
 Basics of Contemporary Cryptography for IT PractitionersThe aim of this book is to provide a comprehensive introduction to cryptography without using complex mathematical constructions. The themes are conveyed in a form that only requires a basic knowledge of mathematics, but the methods are described in sufficient detail to enable their computer implementation. The book describes the main techniques... |  |  |  |  Deploying LINUX on the DesktopCovering Red Hat Enterprise Linux 3 and 4, SuSE Enterprise Linux 9, and Mandrake Linux, this book provides the necessary tools that will allow its readers to use Linux within a Microsoft-centric network environment. It is an invaluable reference regarding the creation of an integrated Linux corporate desktop!
Looking at the world of the... |
|
| Result Page: 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 139 |