You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.
In systems analysis, programming, development, or operations, improving productivity and service - doing more with less - is the major challenge. Regardless of your management level, the Handbook gives you the advice and support you need to survive and prosper in the competitive environment. It is the only comprehensive and timely source of technic
An information security architecture is made up of several components. Each component in the architecture focuses on establishing acceptable levels of control. These controls are then applied to the operating environment of an organization. Functionally, information security architecture combines technical, practical, and cost-effective solutions t
Whether you are active in security management or studying for the CISSP exam, you need accurate information you can trust. A practical reference and study guide, Information Security Management Handbook, Fourth Edition, Volume 3 prepares you not only for the CISSP exam, but also for your work as a professional. From cover to cover the book gives you the information you need to understand the exam's core subjects. Providing an overview of the information security arena, each chapter presents a wealth of technical detail. The changes in the technology of information security and the increasing threats to security from open systems make a complete and up-to-date understanding of this material e...
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedure
If you are a typical Oracle professional, you don't have the luxury of time to keep up with new technology and read all the new manuals to understand each new feature of the latest release from Oracle. You need a comprehensive source of information and in-depth tips and techniques for using the new technology. You need Oracle Internals: Tips, Tricks, and Techniques for DBAs. Oracle has evolved from a simple relational database into one of the most complex e-commerce platforms ever devised. It's not enough for you to understand just the Oracle database. You must also understand the components of the Web server technology, XML, Oracle Security, Oracle and Java, and a host of other issues in or...
HIPAA is very complex. So are the privacy and security initiatives that must occur to reach and maintain HIPAA compliance. Organizations need a quick, concise reference in order to meet HIPAA requirements and maintain ongoing compliance. The Practical Guide to HIPAA Privacy and Security Compliance is a one-stop resource for real-world HIPAA
Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk. Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence o
As manufacturing control systems converge with manufacturing automation systems and systems supporting the back office, IT managers in manufacturing companies are being asked to oversee all their company's IT-including the manufacturing systems. Roadmap to the E-Factory explains what the IT manager needs to know about these unfamiliar systems. It discusses the information value chain, a concept which demonstrates how all computing resources contribute to the success of a manufacturing organization. The material also demonstrates the strategic value of IT, and it includes recommendations for managing the computing resources of a global manufacturing enterprise. An authoritative text on IT, manufacturing, and control systems, Roadmap to the E-Factory provides detailed information on: e-companies e-commerce o Lean manufacturing Supply chain management ERP Operations Emerging trends In addition to helping you gain a basic understanding of manufacturing systems, Roadmap to the E-Factory shows you how IT systems can most effectively support these systems and provides you with a set of recommendations that enables you to derive maximum benefit from them.