Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
Bemærk: Kan ikke leveres før jul.
For anyone involved with computer security, including security administrators, system administrators, developers, and IT managers, this book offers an overview of the security... Læs mere
Bemærk: Kan ikke leveres før jul.
This text focuses on a critical aspect of the Cisco IOS - access lists, which are central to securing routers and networks. It covers intranets, firewalls, and the Internet and focuses on practical instructions for setting router access policies.
Bemærk: Kan leveres før jul.
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
Filled with cutting-edge social engineering testing techniques that are legally and ethically sound, this book fully explains how to plan for a social engineering test, perform reconnaissance, implement the test, and accurately report the results.
Bemærk: Kan ikke leveres før jul.
This book tells IT what they can do now to implement an investment-savvy disaster recovery plan, using what's already in the system, without compromising other network resources.
Bemærk: Kan ikke leveres før jul.
New in the Secure Beginner’s Guide series, this is the ideal get-up-and-running guide for IT professionals seeking complete yet concise coverage of network security backed by time-tested, professional know-how (and secrets) of a seasoned security professional.
Bemærk: Kan ikke leveres før jul.
Renowned Oracle security expert David Knox provides trusted advice and best practices for comprehensive Oracle Database security. Key capabilities from the five major... Læs mere
Bemærk: Kan ikke leveres før jul.
First to market! This is the only book focusing solely on Cisco network hacking, security auditing and defense issues.
Bemærk: Kan ikke leveres før jul.
Preventive strategies for deterring today’s most malicious and least understood risks to enterprise security
Bemærk: Kan ikke leveres før jul.
A clear, actionable blueprint for securing the vital information and IT services of global organizations of all sizes, this essential guide contains invaluable best practices technically vetted by a panel of global security leaders.