Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Getting Started with FortiGate
Getting Started with FortiGate

This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.

Overview

  • Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of...
Web Site Privacy with P3P
Web Site Privacy with P3P
Introducing the long-awaited first step to personal privacy on the Web!

Privacy on the Internet is a very complicated–and delicate–subject. It is about making sure that sites are honest with the people using their services, and providing the end user with the choice of whether or not to share information with the original server....

Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

Instant Marketing for Almost Free: Effective, Low-Cost Results in Weeks, Days, or Hours (Quick Start Your Business)
Instant Marketing for Almost Free: Effective, Low-Cost Results in Weeks, Days, or Hours (Quick Start Your Business)
Dr. Benjamin Spock, the noted pediatrician, once told parents,“You know more than you think you do.”Well, the same holds true for marketing; actually, it probably holds truer, as you know if you’ve ever had kids.And if you’ve had the courage, ingenuity, and creativity to start a small business, or to get...
Pro PHP Security
Pro PHP Security

The Internet is a dangerous place for applications. In fact, it is reasonable to say that you
couldn’t create a less secure system if you tried. It is anonymous, uncontrolled, always on,
and instantly accessible from anywhere. This is a world where every bad actor, cracker, script
kiddie, and scam artist is your
...

Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language...
IPv6 Network Programming
IPv6 Network Programming
Ipv6 Network Programming contains everything you need to make your application program support IPv6. This book covers Ipv6 with a focus on two of the most timely and relevant topics: security and portability. IPv6 socket APIs (RFC2553) are fully described with real-world examples. They are implemented with security in mind, leading you to write...
IT Disaster Recovery Planning For Dummies (Computer/Tech)
IT Disaster Recovery Planning For Dummies (Computer/Tech)

Create a safety net while you work out your major plan

Identify critical IT systems, develop a long-range strategy, and train your people

Some disasters get coverage on CNN — some just create headaches for the affected organization. The right plan will get your business back...

Open Source for Windows Administrators (Administrator's Advantage Series)
Open Source for Windows Administrators (Administrator's Advantage Series)
The Most Comprehensive Reference on Open Source Apps for Windows Users!

This book introduces Microsoft® Windows® administrators to the world of Open Source applications in order to save time and money. It provides readers with information and techniques for using the appropriate Open Source applications in a variety of situations, such...

Understanding Voice over IP Security (Artech House Telecommunications Library)
Understanding Voice over IP Security (Artech House Telecommunications Library)

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which...

The Healthy PC: Preventive Care and Home Remedies for Your Computer
The Healthy PC: Preventive Care and Home Remedies for Your Computer

Keep Your PC Running Smoothly--Without Spending a Lot of Money!

Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy