|
|
Next Generation SSH2 Implementation: Securing Data in MotionThe most up-to-date information on the next generation of SSH and how to incorporate into your organization's security environment.
New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book... | | Integrating ISA Server 2006 with Microsoft Exchange 2007Everything IT pros need to know about using ISA Server 2006 to defend their companies' email and remote users from hack attacks!
This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time... | | Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... |
|
The Best Damn Windows Server 2008 Book Period, Second EditionIn depth coverage for Windows Server 2008 SysAdmins of this new operating system's most challenging features, with bonus coverage of IIS, Exchange, and SQL.
The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to... | | Building Robots With Lego Mindstorms : The Ultimate Tool for Mindstorms Maniacs
This book is about building robots using Lego bricks and components. In the first section of the book (Part I) we will discuss why you might find an interest in robotics as a hobby, and why Lego is an ideal system to have a fast start and great results. If you're reading this book you probably own a Mindstorms set, so you already have an... | | SAP Security Configuration and Deployment: The IT Administrator's Guide to Best PracticesThe user's guide to best practices in improving and enhancing security in a SAP landscape.
Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and... |
|
|
Securing Citrix XenApp Server in the EnterpriseSecure Citrix Presentation Server, which runs on 99% of Fortune 500 Networks!
Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features... | | GFI Network Security and PCI Compliance Power ToolsUse GFI's Tools to Search for Vulnerabilities in Your Network!
For system administrators and IT security professionals to properly secure their networks, it is imperative that they utilize tools which constantly scan their networks and report back suspicious activity and/or the presence of known security vulnerabilities.... | | Mobile Malware Attacks and DefenseThe Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new... |
|
Result Page: 32 31 30 29 28 27 26 25 24 23 |