 |
|
 Test Driving Linux: From Windows to Linux in 60 SecondsFor years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you... |  |  |  |  Security in Distributed, Grid, Mobile, and Pervasive ComputingDespite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee... |
|
 Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2This is the first of two books serving as an expanded and up-dated version of Windows Server 2003 Security Infrastructures for Windows 2003 Server R2 and SP1 & SP2. The authors choose to encompass this material within two books in order to illustrate the intricacies of the different paths used to secure MS Windows server networks.
... |  |  |  |  IPv6 Core Protocols Implementation (The Morgan Kaufmann Series in Networking)The authoritative reference text on KAME and IPv6!
IPv6 was introduced in 1994 and has been in development at the IETF for over 10 years. It has now reached the deployment stage. KAME, the de-facto open-source reference implementation of the IPv6 standards, played a significant role in the acceptance and the adoption of the IPv6... |
|
 |  |  Mastering PerlThis is the third in O'Reilly's series of landmark Perl tutorials, which started with Learning Perl, the bestselling introduction that taught you the basics of Perl syntax, and Intermediate Perl, which taught you how to create re-usable Perl software. Mastering Perl pulls everything together to show you how to bend Perl... |  |  |
|
 Practical Hacking Techniques and CountermeasuresExamining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.
It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to... |  |  Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
- Learn about the various firewall models, user interfaces,
... |  |  Mastering AutoCAD 2008 and AutoCAD LT 2008The World's Bestselling AutoCAD Resource Fully Updated for 2008
There's a reason why Mastering AutoCAD is so popular year after year. Loaded with concise explanations, step-by-step instructions, and hands-on projects, this comprehensive reference and tutorial from award-winning author George Omura has everything you... |
|
| Result Page: 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 |