180 77 2KB
English Pages 650 [352] Year 2005
Report DMCA / Copyright
DOWNLOAD PDF FILE
This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applicatio
277 79 7MB Read more
As a system administrator or security professionals, you probably find yourself inundated each day with a deluge of log
301 111 3MB Read more
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identifi
276 40 3MB Read more
This book sorts through the overwhelming mass of open source security tools, chooses a few of the best, and shows networ
578 53 10MB Read more
A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise Overview L
473 93 5MB Read more
388 68 11MB Read more
Writing robust enterprise applications presents a special challenge for developers, but Microsoft has addressed that cha
423 32 16MB Read more
VMware ESX Server in the Enterprise Planning and Securing Virtualization Servers The Most Complete, Practical, Solutio
369 21 27MB Read more
Containerization has changed the DevOps game completely, with Docker and Kubernetes playing important roles in altering
1,381 59 8MB Read more
108 20 21MB Read more