You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A Comprehensive, Proven Approach to Securing All Your Network Endpoints! Despite massive investments in security technology and training, hackers are increasingly succeeding in attacking networks at their weakest links: their endpoints. Now, leading security expert Mark Kadrich introduces a breakthrough strategy to protecting all your endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against today’s newest threats, and prepare yourself for tomorrow’s attacks. As part of his end-to-end strategy, he shows ho...
A leading security expert introduces a breakthrough strategy to protecting "all" endpoint devices, from desktops and notebooks to PDAs and cellphones. Drawing on powerful process control techniques, Kadrich shows how to systematically prevent and eliminate network contamination and infestation, safeguard endpoints against todays newest threats, and how to prepare for tomorrows.
You'll see how to configure TCP/IP on all the most popular operating systems, including DOS, Windows 3.x, Windows 95, Windows NT, Macintosh, NetWare, OS/2, UNIX, and Linux. You'll see exactly how to install and set up TCP/IP products as well as how to use them.
None
The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization’s unique requirements. You’ll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Securi...
None
The Quantum Age cuts through the hype to demystify quantum technologies, their development paths, and the policy issues they raise.
CD-ROM includes: Implementations of Secure Shell for UNIX, Windows, and other operating systems; SecureCRT; F-Secure SSH Windows clients; NT port for ssh and sshd clients; VMS client; F-Secure SSH Macintosh clients.
Tackling system administration while integrating good security practices, this book includes the newest version of Slackware 3.5, released in July 1998. The CD-ROM also contains a host of other system administration and security tools like SAMBA, MySWL, backup software, and Linuxconf.
Manufacturing and Engineering Technology brings together around 200 peer-reviewed papers presented at the 2014 International Conference on Manufacturing and Engineering Technology, held in San-ya, China, October 17-19, 2014.The main objective of these proceedings is to take the Manufacturing and Engineering Technology discussion a step further. Con