 |
|
|
 Mastering Network SecurityDo you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or... |  |  Cryptography and Security Services: Mechanisms and ApplicationsToday's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and... |  |  Programming Internet EmailThe Internet's "killer app" is not the World Wide Web or Push technologies: it is humble electronic mail. More people use email than any other Internet application. As the number of email users swells, and as email takes on an ever greater role in personal and business communication, Internet mail protocols have become not just an... |
|
 Microsoft Dynamics CRM 4.0 UnleashedMicrosoft® Dynamics CRM 4.0 Unleashed presents start-to-finish guidance for planning, customizing, deploying, integrating, and managing Dynamics CRM in your unique business and technical environment. Authored by two leading Microsoft Dynamics implementers, this book systematically explains how the system... |  |  Mastering Active Directory for Windows Server 2008Detailed Coverage of Active Directory for Windows Server 2008, 2003, 2003 R2, and 2000
If you are responsible for the day-to-day operations of Active Directory, you need this book. From Windows Server 2000 up through the new features available in Windows Server 2008, this comprehensive guide gives you the practical... |  |  Real-Time Concepts for Embedded Systems'... a very good balance between the theory and practice of real-time embedded system designs.' —Jun-ichiro itojun Hagino, Ph.D., Research Laboratory, Internet Initiative Japan Inc., IETF IPv6 Operations Working Group (v6ops) co-chair 'A cl
Develop a working understanding of the common design patterns and program... |
|
 Data Hiding Fundamentals and Applications: Content Security in Digital MultimediaMultimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with... |  |  SOA SecuritySOA is one of the latest technologies enterprises are using to tame their software costs - in development, deployment, and management. SOA makes integration easy, helping enterprises not only better utilize their existing investments in applications and infrastructure, but also open up new business opportunities. However, one of the big stumbling... |  |  Nmap in the Enterprise: Your Guide to Network ScanningRichard Stiennon, vice president at Gartner "Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."
A... |
|
Result Page: 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 |