 |
|
 |  |  IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)The authoritative reference text on KAME and IPv6!
IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6... |  |  |
|
 Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.
... |  |  Networking For DummiesCompany just hooked you up to a network and you’re wondering what the heck you’re supposed to do with it? Tired of burning spreadsheets onto CDs just so you can share them with coworkers, and you’re wondering what it’ll take to set up a network in your organization? Been tasked with setting up a network and you don’t... |  |  |
|
 Hacking Exposed WirelessSecure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute... |  |  Professional SQL Server 2005 Administration (Wrox Professional Guides)SQL Server 2005 is the largest leap forward for SQL Server since its inception. With this update comes new features that will challenge even the most experienced SQL Server DBAs. Written by a team of some of the best SQL Server experts in the industry, this comprehensive tutorial shows you how to navigate the vastly changed landscape of the SQL... |  |  The Oracle Hacker's Handbook: Hacking and Defending Oracle
Knowledge is power, and the power can be yours
While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you... |
|
 PC Magazine Windows Vista Security SolutionsWhen you want to defend Windows Vista,it's good to know a PC Magazine expert
Unless a time machine just dropped you in the 21st century, you already know that protecting your computer is essential. Now, here's Vista—new enough that no one is sure exactly what security threats might arise to hijack your... |  |  Windows Vista Security: Securing Vista Against Malicious AttacksIt's not the computer. The hacker's first target is YOU!
A dirty little secret that vendors don't want you to know is that good computer security doesn't cost a thing. Any solution you can buy is guaranteed to fail. Malicious hackers use this fact to their advantage. Real security is gained by understanding the enemy's tactics and... |  |  Biometrics: Identity Verification in a Networked WorldAn in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment
No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce... |
|
Result Page: 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 |