 |
|
|
 |  |  Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... |  |  |
|
 Cisco Secure Firewall Services Module (FWSM)
By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.
The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either... |  |  iMac For Dummies (Computer/Tech)Congratulations! When you bought that shiny new anodized aluminum iMac, you made a great choice. Now you want take advantage and control of that baby's awesome speed, high performance, powerful operating system, and fantastic applications, and iMac for Dummies, 5th Edition is here to help you do just that!
This easy-to-use guide... |  |  Java 2 Web Developer Certification Study Guide, 2nd EditionHere’s the book you need to prepare for Exam 310-080, Sun Certified Web Component Developer for J2EE Platform.
This Study Guide provides:
- In-depth coverage of every exam objective
- Practical information on programming servlets, developing JSP pages,...
|
|
|
| Result Page: 117 116 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 |