Learn network security basics using this practical guide
Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to...
Neuroimmunology is one of the most rapidly developing branches of Neurobiology, prompted by novel neurochemical, neuroendocrinological, and neurophysiological investigations of the central and peripheral nervous system including neuroendocrine systems. Neuroimmunology can be considered as an interdisciplinary science that covers relevant...
PLAN, INSTALL, CONFIGURE, SECURE, OPTIMIZE AND TROUBLESHOOT! Citrix MetaFrame is the de facto standard for hosting and delivering applications from Windows-based servers. Citrix MetaFrame Presentation Server 3.0 is optimized for performance under Windows Server 2003, particularly Terminal Services. This book covers all the topics...
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Think there's no malicious software on your computer? PC Magazine thinks you should think again.
Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...
Web caching and content delivery technologies provide the infrastructure on which systems are built for the scalable distribution of information. This proceedings of the eighth annual workshop, captures a cross-section of the latest issues and techniques of interest to network architects and researchers in large-scale content delivery. Topics...
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Now it's easier than ever to get the most out of this wildly popular version of Linux. How to Do Everything: Ubuntu leads you through the interface, the built-in applications, and the process of installing software and peripherals. You'll get details on the full-featured OpenOffice.org...
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
An understanding of virus infection and the underlying role of the immune system in protection against these diseases is vital in today’s medical climate. Previously, only symptoms could be treated, as there were no antiviral therapies. The increasing amounts of research and the huge number of discoveries of immunologic agents and...