Filter
Datasikkerhet
Filter
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with …
Take network security to the next level!This book has never before published advanced security techniques and step-by-step instructions showing how to defend against devastating …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the …
Discusses the diverse types of authentication--PINs, passwords, Tokens, USB Tokens, Smart Cards, Voice, Signature, Keystroke, Iris, Fingerprint, Face, or Hand--and how to select …
With comprehensive coverage of RMAN (Recovery Manager), Oracle's free backup and recovery technology, guide includes in-depth coverage of RMAN fundamentals, including the RMAN …
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the …
Written in conjunction with RSA Security--the most trusted name in e-security--this book gives a detailed presentation of IPSec components, implementation, and VPN …
Since its publication,Security Analysis by Graham and Dodd has been the investment bible and has sold more than 750,000 copies. Now the fifth edition of this classic updates the …
Completely reviewed by technical experts at CheckPoint, this valuable tool shows network administrators and engineers the essentials of installing, running, and troubleshooting the …