|
|
|
|
Solaris 9 Security (Networking)Solaris is one of the most widely used operating systems. One of the main reasons for its popularity is its enhanced security. Solaris 9 protects systems from internal and external security threats by restricting access to system data, authenticating and encrypting interactive sessions with the Solaris operating environment, and supporting protocol... | | Endurance: Winning Life's Majors the Phil Mickelson Way
As one of the five clubs that founded the United States Golf
Association and with the first and oldest clubhouse in the
United States (opened in 1892), Shinnecock Hills in
Southampton, New York, is America’s version of St. Andrews,
a links course bathed in beauty and rock-hard difficulty colored
most brilliantly by... | | SSL & TLS Essentials: Securing the WebThe Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now—for the first time the details of these critical security... |
|
|
Bulletproofing TCP/IP Based Windows NT/2000 NetworksFind out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of... | | Quantum Cryptography and Secret-Key Distillation
This book aims at giving an introduction to the principles and techniques
of quantum cryptography, including secret-key distillation, as well as some
more advanced topics. As quantum cryptography is now becoming a practical
reality with products available commercially, it is important to focus not
only on the theory of quantum... | | |
|
Hacking Exposed: Network Security Secrets & Solutions, Third Edition"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool
"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."... | | Securing Windows Server 2003As the title implies, this book is about security in the Windows Server 2003 operating system and how to put it to work on behalf of your organization and your users.
Windows Server 2003 has quite a number of uses. It can serve in a network support role, supplying services such as DHCP and DNS. It can... | | Forensic Computer Crime InvestigationThe Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest... |
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 |