 |
|
 Computer Security HandbookThe definitive formula for computer security, from power outages to theft and sabotage
Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and... |  |  SIP SecurityThis book gives a detailed overview of SIP specific security issues and how to solve them
While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms... |  |  Beautiful Security: Leading Security Experts Explain How They ThinkIn this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found... |
|
 VMware VI3 Implementation and AdministrationThis is the most comprehensive guide to planning for, implementing, securing, maintaining, monitoring, and troubleshooting VMware VI3 in any IT environment. Written by Eric Siebert, a veteran VMware system administrator and one of only 300 vExperts named by VMware in 2009, this book will help IT professionals make the best... |  |  Encyclopedia of CybercrimeThe first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and... |  |  SQL Injection Attacks and DefenseSQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information to turn to for help. This is the only book devoted exclusively to this long-established but recently growing threat. It includes all the currently known... |
|
 |  |  ModSecurity 2.5With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you... |  |  |
|
|
| Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |