233 24 19MB
English Pages 682 Year 2004
Report DMCA / Copyright
DOWNLOAD CHM FILE
507 84 1MB Read more
448 25 67MB Read more
A comprehensive guide to secure your future on Cloud Key Features ● Learn traditional security concepts in the cloud a
286 17 6MB Read more
There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in eac
327 71 2MB Read more
118 4 5MB Read more
In a course, this book was used as teaching material in a class for computer security. The read, reminded me of speaking
622 7 2MB Read more
Linux consistently appears high up in the list of popular Internet servers, whether it's for the Web, anonymous FTP
416 107 2MB Read more
Cisco Systems strives to help customers build secure internetworks through network design featuring its Cisco Secure pro
602 71 7MB Read more
Your complete guide to the what, why, where, and how of Java SecurityIn this unique guide, two Java security experts sho
431 74 8MB Read more
Now Fully Updated: The Definitive, Vendor-Neutral Guide to Cloud Computing Success Cloud computing offers immense oppo
219 56 38MB Read more