 |
|
|
|
|
|
 Network Security Essentials: Applications and Standards (4th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections... |  |  Implementing SSH: Strategies for Optimizing the Secure Shell Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to... |  |  HackNotes(tm) Linux and Unix Security Portable ReferenceHackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and... |
|
|
|
Result Page: 6 5 4 3 2 1 |