Bulletproofing TCP/IP Based Windows NT/2000 NetworksFind out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of... | | Good Credit Is SexyThis book contains everything you need to NEED to know about your credit, even if it is excellent. Good credit is sexy covers topics such as identity theft, getting rid of junk mail, getting a mortgage or auto lease, and of course, how to fix your credit......
Do you carry around a pocket full of cash, telling your friends that cash is... | | Managing Information Security, Second Edition
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers... |