| |
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the...
Editeur :
Syngress
Parution :
2006-03-31
PDF sans DRM
|
How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be...
Editeur :
Syngress
Parution :
2006-03-16
PDF sans DRM
|
Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever...
Editeur :
Syngress
Parution :
2006-03-01
PDF sans DRM
|
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year.The purpose of the Foundations series is to identify these...
Editeur :
Sybex
Parution :
2006-02-20
PDF
|
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...
Editeur :
Syngress
Parution :
2006-02-08
PDF sans DRM
|
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing...
Editeur :
Syngress
Parution :
2006-01-27
PDF sans DRM
|
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every...
Editeur :
Syngress
Parution :
2006-01-09
PDF sans DRM
|
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit,...
Editeur :
Syngress
Parution :
2006-01-05
PDF sans DRM
|
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...
Editeur :
Syngress
Parution :
2005-12-15
PDF sans DRM
|
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book...
Editeur :
Syngress
Parution :
2005-12-15
PDF sans DRM
|
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin...
Editeur :
Syngress
Parution :
2005-12-12
epub sans DRM
|
Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the...
Editeur :
Syngress
Parution :
2005-12-12
PDF sans DRM
|
This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are...
Editeur :
Syngress
Parution :
2005-12-12
PDF sans DRM
|
Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The...
Editeur :
Syngress
Parution :
2005-11-21
PDF sans DRM
|
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach...
Editeur :
Wiley-Interscience
Parution :
2005-11-11
PDF
|
Check Point NGX VPN-1/Firewall-1 is the next major release ofCheck Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection &...
Editeur :
Syngress
Parution :
2005-11-01
PDF sans DRM
|
This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it...
Editeur :
Syngress
Parution :
2005-10-21
epub sans DRM
|
Taking a psychological perspective, this book examines the role of Human-Computer Interaction in the field of Information Systems research. The introductory section of the book covers the basic tenets of the HCI discipline, including how it developed and an overview of...
Editeur :
Butterworth-Heinemann
Parution :
2005-09-09
PDF sans DRM
|
This book will detail the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding...
Editeur :
Syngress
Parution :
2005-08-31
PDF sans DRM
|
Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the...
Editeur :
Syngress
Parution :
2005-08-26
PDF sans DRM
|