Télécharger le livre :  Practical VoIP Security
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the...

Editeur : Syngress
Parution : 2006-03-31
PDF sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Configuring ISA Server 2004
How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be...

Editeur : Syngress
Parution : 2006-03-16
PDF sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Managing Microsoft Operations Manager 2005
Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever...

Editeur : Syngress
Parution : 2006-03-01
PDF sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security Foundations
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year.The purpose of the Foundations series is to identify these...

Editeur : Sybex
Parution : 2006-02-20
PDF

24,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Editeur : Syngress
Parution : 2006-02-08
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Log Management
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing...

Editeur : Syngress
Parution : 2006-01-27
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Perfect Passwords
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every...

Editeur : Syngress
Parution : 2006-01-09
PDF sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Writing Security Tools and Exploits
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit,...

Editeur : Syngress
Parution : 2006-01-05
PDF sans DRM

32,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Designing Security for a Windows Server 2003 Network
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Editeur : Syngress
Parution : 2005-12-15
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book...

Editeur : Syngress
Parution : 2005-12-15
PDF sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Skype Me! From Single User to Small Enterprise and Beyond
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin...

Editeur : Syngress
Parution : 2005-12-12
epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Managing Windows Server Update Services
Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the...

Editeur : Syngress
Parution : 2005-12-12
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing IM and P2P Applications for the Enterprise
This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are...

Editeur : Syngress
Parution : 2005-12-12
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Phishing Exposed
Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The...

Editeur : Syngress
Parution : 2005-11-21
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Security
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach...

Editeur : Wiley-Interscience
Parution : 2005-11-11
PDF

94,90

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring Check Point NGX VPN-1/Firewall-1
Check Point NGX VPN-1/Firewall-1 is the next major release ofCheck Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection &...

Editeur : Syngress
Parution : 2005-11-01
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at IT Project Management
This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it...

Editeur : Syngress
Parution : 2005-10-21
epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Understanding Mobile Human-Computer Interaction
Taking a psychological perspective, this book examines the role of Human-Computer Interaction in the field of Information Systems research. The introductory section of the book covers the basic tenets of the HCI discipline, including how it developed and an overview of...

Editeur : Butterworth-Heinemann
Parution : 2005-09-09
PDF sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring VMware ESX Server 2.5
This book will detail the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding...

Editeur : Syngress
Parution : 2005-08-31
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security Evaluation Using the NSA IEM
Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the...

Editeur : Syngress
Parution : 2005-08-26
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
<< < 2930313233 >