Filter
Nätverkssäkerhet
Filter
The Linux world is constantly changing, requiring new knowledge and skills to work as a Linux system administrator. Linux Fundamentals, Second Edition not only updates the first …
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert …
The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this …
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Series meets all standards put forth by CNSS 4011 & 4013A! Access control protects resources …
Ethical Hacking: Techniques, Tools, and Countermeasures, Fourth Edition, covers the basic strategies and tools that prepare students to engage in proactive and aggressive cyber …
PART OF THE JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Revised and updated with the latest data in the field, the Second Edition of Managing Risk in …
Secure Software Systems presents an approach to secure software systems design and development that tightly integrates security and systems design and development (or software …
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully revised and updated with the latest data from the field, Network Security, …
Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three …
The third edition of Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S. based Information systems and IT infrastructures compliance laws in …