You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.
Explains how spam works, how network administrators can implement spam filters, or how programmers can develop new remarkably accurate filters using language classification and machine learning. Original. (Advanced)
A guide to using FreeBSD 7 to build servers covers such topics as installation and booting, kernels, system security, disks and file systems, Web services, upgrading, software management, and system performance and monitoring.
Discover over 90 practical and exciting recipes that leverage the power of OpenVPN 2.4 to help you obtain a reliable and secure VPN About This Book Master the skills of configuring, managing, and securing your VPN using the latest OpenVPN Gain expertise in establishing IPv6 connections and understand PolarSSL using the latest version of OpenVPN This book contains enticing recipes about OpenVPN functionalities that cater to mission critical applications Who This Book Is For This book is for system administrators who have a basic knowledge of OpenVPN and are eagerly waiting to build, secure, and manage VPNs using the latest version. This book assumes some prior knowledge of TCP/IP networking a...
This book is written in cookbook style and it offers learning through recipes with examples and illustrations. Each recipe contains step-by-step instructions about everything necessary to execute a particular task. The book is designed so that you can read it from start to end for beginner's or just open up any chapter and start following the recipes as a reference for advanced users,"CentOS 6 Linux Server Cookbook" is for Linux professionals and system administrators using CentOS for their business’s server
The best resource on the very latest for Ubuntu users! Ubuntu is a free, open-source, Linux-based operating system that can run on desktops, laptops, netbooks, and servers. If you've joined the millions of users around the world who prefer open-source OS-and Ubuntu in particular-this book is perfect for you. It brings you the very latest on Ubuntu 10.04, with pages of step-by-step instruction, helpful tips, and expert techniques. Coverage Includes: The Ubuntu Linux Project Installing Ubuntu Installing Ubuntu on Special-Purpose Systems Basic Linux System Concepts Using the GNOME Desktop Using the Compiz Window Manager Managing E-Mail and Personal Information with Evolution Surfing the Web wit...
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wir...
A guide to using Postfix covers such topics as filtering spam and viruses, authenticating users, encrypting with TLC, and setting up mail gateways.
None