Filter
Nettverksikkerhet
Filter
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS AAA solutions are very frequently used by customers …
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, …
Today's organizations need a new security model that more effectively adapts to the complexity and risks of modern environments, embraces hybrid workplaces, and protects people, …
Your hands-on, step-by-step guide to building connected, service-oriented applications. Teach yourself the essentials of Windows Communication Foundation (WCF) 4 -- one step at a …
Complete Hands-On Help for Securing VMware vSphere and Virtual Infrastructure by Edward Haletky, Author of the Best Selling Book on VMware, VMware ESX Server in the Enterprise As …
Praise for Virtual Honeypots "e;A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader's eyes."e; …
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there's a …
Your essential guide to deploying IPv6 on Windows networks Get in-depth technical information to put IPv6 technology to work-including networks with hardware running Windows 8 and …
If you're a security or network professional, you already know the "e;do's and don'ts"e;: run AV software and firewalls, lock down your systems, use encryption, watch …
"e;This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a 'must have' for every researcher, student, and practicing …