Free Delivery Over $100
10034 books were found.
Helps you determine if you have what it takes to keep hackers out of your network. This title features twenty real-life... Read More >>
Introduces readers to firewall concepts, and explores various commercial and open source firewall implementations,... Read More >>
To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar... Read More >>
Illustrates the many dangers faced by those who use the Internet to send or receive email, surf the Web, conduct... Read More >>
Provides an overview of the implementation of an Information Security Management System that conforms to the requirements... Read More >>
Read More >>
Illustrates how to maintain content integrity and network assurance. This book discusses the convergence market... Read More >>
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive... Read More >>
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This... Read More >>
Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation is a definitive textbook on... Read More >>
Deals with computers/software. Read More >>
"Cyber crime expert Hitchcock helps individuals and business users of the Web protect themselves, their children,... Read More >>
Today's uber viruses, worms, and trojans may seem more damaging than ever, but the attacking malware and malicious... Read More >>
Eases the complexity of CSA installation and management. This title: helps users maximize their CSA investment and... Read More >>
Helps IT managers and assets protection professionals to assure the protection and availability of vital digital... Read More >>
Undertakes a comprehensive linguistic and historical study of the plain style tradition in poetry, its relationship... Read More >>
Voice Over IP (VoIP) phone lines now represent over 50 per cent of all new phone line installations. Every one of... Read More >>
"Praise for Sarbanes-Oxley Guide for Finance and Information Technology Professionals ""Effective SOX programs... Read More >>
Voice Over IP (VoIP) phone lines must be protected from malicious hackers because these devices reside on the network.... Read More >>
"""Web Service Security: Scenarios, Patterns, and Implementation Guidance For Web Services Enhancements 3.0"" deals... Read More >>
Provides details on the critical security tools, explains their function, and demonstrates how to configure them... Read More >>
Microsoft Operations Manager is a network monitoring tool that provides enterprise-class event and performance management... Read More >>
Reveals why your Web servers represent such a compelling target, how significant exploits are performed, and how... Read More >>