 |
|
|
 |  |  Cryptography for Internet & Database ApplicationsCryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest... |  |  Solaris 9 Security (Networking)Solaris is one of the most widely used operating systems. One of the main reasons for its popularity is its enhanced security. Solaris 9 protects systems from internal and external security threats by restricting access to system data, authenticating and encrypting interactive sessions with the Solaris operating environment, and supporting protocol... |
|
 Security+ Study GuideOver 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides
The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test... |  |  Securing VoIP Networks: Threats, Vulnerabilities, and CountermeasuresCommunication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony... |  |  Mastering Microsoft Exchange Server 2007By utilizing the latest features of Microsoft Exchange Server 2007, you'll be able to provide your company with the security it needs while enabling employees to access critical information regardless of their location or type of device.
Now with this comprehensive guide, you'll find out how to effectively install, configure, and manage... |
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 |