Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)

Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.

As the...

Windows(R) PowerShell Unleashed
Windows(R) PowerShell Unleashed
PowerShell is one of the most exciting new products to come out of Microsoft in a long time. It is both a new scripting language and a command-line shell. People who have seen the demos have been extremely impressed by the power it brings to admins to automate and customize their regular tasks. PowerShell will be used as the basis for all...
Microsoft® Exchange Server 2007 Administrator's Companion
Microsoft® Exchange Server 2007 Administrator's Companion
Get your mission-critical messaging and collaboration systemsup and running with the essential guide to deploying and managing ExchangeServer 2007. This comprehensive administrator's reference covers the fullrange of server and client deployments, unified communications, messagingsecurity, performance optimization, troubleshooting, and disaster...
Microsoft  Windows Server(TM) 2003 PKI and Certificate Security
Microsoft Windows Server(TM) 2003 PKI and Certificate Security
No need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Microsoft Windows Server 2003! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication,...
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the...

MCITP Guide to Microsoft Windows Server 2008, Enterprise Administration (Exam # 70-647) (Mcts)
MCITP Guide to Microsoft Windows Server 2008, Enterprise Administration (Exam # 70-647) (Mcts)
MCITP Guide to Windows Server 2008, Enterprise Administrator (Exam 70-647) provides in-depth coverage of the 70-647 certifi cation exam objectives and focuses on the skills needed to manage a Windows Server 2008 enterprise. The book contains approximately 85 hands-on activities and 40 skill-reinforcing case projects, so...
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic...
Microsoft Exchange Server 2003 Administrator's Companion
Microsoft Exchange Server 2003 Administrator's Companion

Get your mission-critical messaging and collaboration systems up and running quickly with the essential guide to deploying and managing Exchange Server 2003. This comprehensive administrator’s reference details system features and capabilities, sharing hands-on insights for working with new connectivity, information management, and...

Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)
Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system’s security infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003...

Websphere MQ Security in an Enterprise Environment (IBM Redbooks)
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)

This IBM Redbook considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This Redbook also documents the before and after configurations needed to take advantage of the recent...

Android Apps Security
Android Apps Security

Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps.

This book will provide developers with the
...

Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy