|
|
|
|
Building a Cisco Network for WIndows 2000The release of Windows 2000 Server represents a major advance in the integration of Microsoft's and Cisco's network technologies. Windows 2000 provides an LDAP-compliant directory service called Active Directory. It is accessible over any TCP/IP based internetwork, including the Internet. As such, the Active Directory is the foundation of this... | | Configuring Exchange 2000 ServerC.A. Murff MCSE, MCT, CTT, CNA Who should read this book? Anyone looking for clear, relevant answers on how to best utilize their existing Exchange 2000 environment.
Configuring Exchange Server 2000 is an intermediate to advanced book for both administrators and developers who are actively using... | | Penetration Tester's Open Source Toolkit, Volume 2Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing... |
|
|
|
Black Hat Physical Device Security: Exploiting Hardware and SoftwareAttacking & Defending Physical Devices for Software and Hardware EngineersThe security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy,... | | Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary
form as early as the 1960’s, AR is only now becoming truly practical. Recent
advances in mobile processing, coupled with an explosion in digital storage capacity,
ubiquity of wireless broadband connections, mass adoption of smart phones, and... | | Check Point Next Generation Security AdministrationCheck Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check... |
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |