311 22 6MB
English Pages 256 Year 2009
Report DMCA / Copyright
DOWNLOAD CHM FILE
The authors cover all aspects of security monitoring within real world environments and provide some very sound strategi
300 102 3MB Read more
Overcome Your Fastest-Growing Security Problem: Internal, Client-Based Attacks Today's most devastating security a
356 93 4MB Read more
385 49 679KB Read more
Network security is not simply about building impenetrable walls—determined attackers will eventually overcome tradition
372 67 11MB Read more
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers--bot
640 74 12MB Read more
In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement
313 70 15MB Read more
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks
555 9 5MB Read more
Learn how VMware has brought its enterprise-class software-defined Data Center software to the AWS Cloud. This book will
145 65 13MB Read more
This book provides a concise survey and description of recent collision detection methods for robot manipulators. Beginn
147 102 3MB Read more
362 32 25KB Read more