|
|
|
|
Security in Computing, Third EditionSecurity in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.
This sweeping revision of the field's classic guide to computer... | | Broadband Internet: Access, Regulation and PolicyThe internet has become so widespread that such issues as access, regulation and related policies have become major factors in the economy and social fabric of societies in every part of the world. Peoples without running water are demanding access to the internet and those without it are becoming deprived citizens. This new book examines current... | | CCNP Security VPN 642-647 Official Cert Guide
This book is designed to help you prepare for the Cisco VPN certification exam. The
VPN exam is one in a series of exams required for the Cisco Certified Network
Professional - Security (CCNP - Security) certification. This exam focuses on the application
of security principles with regard to Cisco IOS routers,... |
|
|
|
| | | | Configuring Sonicwall FirewallsEvery enterprise requires at least one firewall to provide the backbone for its network security architecture. Firewalls are the core component of your network’s security. The risks today have greatly increased, so the call for a stronger breed of firewall has been made. In the past, simple packet-filtering firewalls allowing... |
|
|
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 |