|
|
|
|
| | Security+ Study GuideOver 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides
The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test... | | |
|
|
The Best Damn Cybercrime and Forensics Book PeriodAs is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.
If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the... | | Video Conferencing Over IP: Configure, Secure, and TroubleshootBefore we help you understand what you need to make video calls, let’s discuss the various flavors of videoconferencing and outline the topics we focus on in this book so that you have a clear understanding of the differences among the various videoconferencing solutions. We divide these videoconferencing types into three... | | Nessus Network Auditing, Second EditionIn the war zone that is the modern Internet, manually reviewing each networked system for security fl aws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
... |
|
Managing Active Directory for Windows 2000 Server (Syngress)Windows 2000's Active Directory provides a single uniform interface to all of the network's resources, including printers, documents, e-mail addresses, databases, and users. It also manages naming, querying, registration, and resolution needs. This book introduces readers to all of Active Directory's capabilities.
Active... | | | | CYA: Securing Exchange Server 2003 & Outlook Web AccessCoverage includes: Exchange 2000 Administrative Rights, Mailbox Rights, Denial of Service and Exchange, Types of File Vulnerabilities, Vulnerability of Transmitted Data, Message Authenticity, Event Service and Event Sinks, Message Relay via SMTP, Preventing Exchange Security Problems, The W2K/IIS Platform Must Be Solid, Dedicate Servers to Specific... |
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |