Free Delivery Over $100
10356 books were found.
Read More >>
Eases the complexity of CSA installation and management. This title: helps users maximize their CSA investment and... Read More >>
Helps IT managers and assets protection professionals to assure the protection and availability of vital digital... Read More >>
Identifies the main drivers of e-government, assesses the responses of Canada's public sector, and sketches out... Read More >>
Voice Over IP (VoIP) phone lines now represent over 50 per cent of all new phone line installations. Every one of... Read More >>
Praise for Sarbanes-Oxley Guide for Finance and Information Technology Professionals ""Effective SOX programs... Read More >>
Voice Over IP (VoIP) phone lines must be protected from malicious hackers because these devices reside on the network.... Read More >>
"""Web Service Security: Scenarios, Patterns, and Implementation Guidance For Web Services Enhancements 3.0"" deals... Read More >>
Provides details on the critical security tools, explains their function, and demonstrates how to configure them... Read More >>
Reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how... Read More >>
Shows the reader how to guard agains rampant viruses and worms, and to identify hacker threats. Read More >>
Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable... Read More >>
Provides an introduction to network attack mitigation with IPS. This work offers an overview of Intrusion Prevention... Read More >>
A handy problem-solver that teaches you how to perform important security tasks in the Windows Server 2003 OS, using... Read More >>
School of Computing, University of Glamorgan, Wales UK Read More >>
First to market! This is the only book focusing solely on Cisco network hacking, security auditing and defense... Read More >>
Examines how risk management security technologies must prevent virus and computer attacks, as well as providing... Read More >>
Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book... Read More >>
Contains detailed explanations of various Cisco VPN products, describing the details of setting up IPSec and SSL... Read More >>
The author offers a guide for readers to learn how to reap the benefits of the Internet while reducing the risks... Read More >>