|
|
|
|
|
|
Dr. Tom Shinder's Configuring ISA Server 2004This book is based in large part on our own trials and tribulations (as well as the occasional “Eureka!” moment) that we’ve experienced working with ISA Server 2004. In this book, we are talking to people much like ourselves—experienced Windows network administrators who want to secure their networks and speed up Web... | | Implementing SSL / TLS Using Cryptography and PKI
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or... | | Penetration Testing with the Bash shell
Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools
About This Book
-
Utilize the command line to create, run, and execute tests
-
Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
|
|
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |