 Designing and Building Enterprise DMZsThis is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.
One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a... |  |  OS X for Hackers at Heart: The Apple of Every Hacker's EyeThe sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hackers eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the worlds foremost true hackers unleash the power of OS X for everything form cutting edge research... |  |  Perfect Passwords: Selection, Protection, AuthenticationUser passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According... |