Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
SNORT, the defacto standard of intrusion detection tools, can save countless headaches; the new SNORT Cookbook will save countless hours of trial and error. Each "recipe" offers a clear... Læs mere
Bemærk: Kan ikke leveres før jul.
'Smart Home Hacks' covers a litany of stand-alone and integrated smart home solutions designed to enhance safety, comfort, and convenience in new and existing homes. Learn how to equip... Læs mere
Bemærk: Kan ikke leveres før jul.
This hands-on guide is designed for developers who want to go far beyond the obvious features of Visual Studio, a feature-rich Integrated... Læs mere
Bemærk: Kan leveres før jul.
SSH is a popular protocol for securing your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations... Læs mere
Bemærk: Kan ikke leveres før jul.
Reveals how to use, tweak, and push the popular network security applications, utilities, and tools using Windows, Linux, Mac OS X, and Unix platforms. This book offers multiple... Læs mere
Bemærk: Kan ikke leveres før jul.
Until recently, learning CoreDNS required reading the code or combing through the skimpy documentation on the website. No longer. With this... Læs mere
Bemærk: Kan ikke leveres før jul.
This book is the complete and authorized introduction to Juniper Network's new SRX hardware series running the Junos operating system. You not only get a hands-on field guide to deploying,... Læs mere
Bemærk: Kan leveres før jul.
If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
Bemærk: Kan ikke leveres før jul.
For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, this book offers an overview of the security... Læs mere
Bemærk: Kan ikke leveres før jul.
This text focuses on a critical aspect of the Cisco IOS - access lists, which are central to securing routers and networks. It covers intranets, firewalls, and the Internet and focuses on practical instructions for setting router access policies.
Bemærk: Kan leveres før jul.
Bemærk: Kan leveres før jul.