|
|
|
|
|
|
Microsoft Windows Server(TM) 2003 PKI and Certificate SecurityNo need to buy or outsource costly PKI services when you can use the robust PKI and certificate-based security services already built into Microsoft Windows Server 2003! This in-depth reference teaches you how to design and implement even the most demanding certificate-based security solutions for wireless networking, smart card authentication,... | | Identity and Data Security for Web Development: Best Practices
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how... | | Kali Linux CTF Blueprints
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
About This Book
-
Put the skills of the experts to the test with these tough and customisable pentesting projects
-
Develop each challenge to suit your specific...
|
|
IBM WebSphere Application Server v7.0 Security
IBM WebSphere Application Server Network Deployment is IBM's flagship J2EE application server platform. It implements the J2EE technology stack. This stack enables the WebSphere Application Server platform to execute the user's Java enterprise applications that perform business functions. There are several roles who use this platform... | | HTTP Developer's Handbook (Developer's Library)HTTP is the protocol that powers the Web. As Web applications become more sophisticated, and as emerging technologies continue to rely heavily on HTTP, understanding this protocol is becoming more and more essential for professional Web developers. By learning HTTP protocol, Web developers gain a deeper understanding of the Web's architecture and... | | CYA: Securing Exchange Server 2003 & Outlook Web AccessCoverage includes: Exchange 2000 Administrative Rights, Mailbox Rights, Denial of Service and Exchange, Types of File Vulnerabilities, Vulnerability of Transmitted Data, Message Authenticity, Event Service and Event Sinks, Message Relay via SMTP, Preventing Exchange Security Problems, The W2K/IIS Platform Must Be Solid, Dedicate Servers to Specific... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |