 |
|
 Networking All-in-One Desk Reference for Dummies9 books in 1– your key to networking success!
Your one-stop guide to building, securing, and administering networks large and small
So you’re in charge of the network? No worries! This handy all-in-one guide provides a bird’s-eye view of all the important stuff, like installing and configuring various network... |  |  Practical Internet SecurityAs organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external... |  |  Linux Security: Craig Hunt Linux LibraryAuthoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators
This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the... |
|
|
|
 Bulletproofing TCP/IP Based Windows NT/2000 NetworksFind out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of... |  |  Role-Based Access Control, Second EditionRole-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners... |  |  Forensic Computer Crime InvestigationThe Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions…and stealthily executed cyber crimes. Featuring contributions from digital forensic experts, the editor of Forensic Computer Crime Investigation presents a vital resource that outlines the latest... |
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 |