|
|
|
|
How to Cheat at Securing a Wireless NetworkWireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
- Denial of service (DoS) and other network layer attacks
- Unauthorized
... | | | | Combating Spyware in the EnterpriseSpyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain... |
|
|
Venture Capital Funding: A Practical Guide to Raising FinanceAfter the problems caused by the dot com boom, there is now renewed interest in venture capital: private equity funds are reporting significantly increased levels of activity both in the UK and worldwide. The Bank of England regards assisting firms to become "investment ready" as the single most important task facing financial... | | Mastering Windows Server 2003The Only Windows Server Resource You Need The single most comprehensive and understandable book on the subject, Mastering Windows Server 2003 continues author Mark Minasi's award-winning tradition of clear and comprehensive coverage of Microsoft's Windows Server products. This book shows you how to plan, configure and install... | | Securing Java: Getting Down to Business with Mobile Code, 2nd EditionInformation Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent... |
|
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 |