Datorsäkerhet
Filter
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire …
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire …
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there's a …
Your hands-on, step-by-step guide to building connected, service-oriented applications. Teach yourself the essentials of Windows Communication Foundation (WCF) 4 -- one step at a …
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment …
If you're a security or network professional, you already know the "e;do's and don'ts"e;: run AV software and firewalls, lock down your systems, use encryption, watch …
"e;This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a 'must have' for every researcher, student, and practicing …
SSL Remote Access VPNs An introduction to designing and configuring SSL virtual private networks Jazib Frahim, CCIE(R) No. 5459 Qiang Huang, CCIE No. 4937 Cisco(R) SSL VPN …
SELinux: Bring World-Class Security to Any Linux Environment! SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and …
Security Operations Center Building, Operating, and Maintaining Your SOC The complete, practical guide to planning, building, and operating an effective Security Operations …