Onderwerpen
- Backoffice-systemen (1)
- Besturingsprogramma's (2)
- Databases (2)
- Datacommunicatie en netwerken (85)
- Informatica & management (28)
- Informatiekunde (1)
- Internet (1)
- Programmeertalen (1)
- Theoretische informatica (1)
- Toegepaste webdesign (1)
Verfijnen
Verwachte titels
Nieuwste titels
81
€ 42,30
Developer's Guide to Web Application Security
Engels , E-book, 18-04-2011Levertijd: Printing on demand
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.This book defines Web applica... Lees verder
82
€ 32,60
How to Cheat, How to Cheat at Securing a Wireless Network
Essential Knowledge for Multitasked Managers
Engels , E-book, 22-08-2006Levertijd: Printing on demand
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless networkWith... Lees verder
83
€ 42,30
Scripting VMware Power Tools: Automating Virtual Infrastructure Administration
Power Tools for Automating Virtual Infrastructure Administration
Engels , E-book, 07-11-2006Levertijd: Printing on demand
This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server. This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail the different scripting APIs ... Lees verder
84
€ 42,30
Cyber-Fiction, Zero-Day Exploit:
Countdown to Darkness
Engels , E-book, 16-07-2004Levertijd: Printing on demand
The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of t... Lees verder
85
€ 48,35
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Engels , E-book, 29-10-2003Levertijd: Printing on demand
Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades having happened in February of 2003. A comprehensive, up-to-date guide to the hardware and softwa... Lees verder
86
€ 42,30
Cyber Adversary Characterization
Auditing the Hacker Mind
Engels , E-book, 09-07-2004Levertijd: Printing on demand
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer system... Lees verder
87
€ 42,30
Inside the SPAM Cartel
By Spammer-X
Engels , E-book, 13-11-2004Levertijd: Printing on demand
Authored by a former spammer, this is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld. From the Author: "You may hate spam and think all spammers are evil, but listen to my st... Lees verder
88
€ 32,60
How to Cheat, How to Cheat at Managing Microsoft Operations Manager 2005
Engels , E-book, 01-03-2006Levertijd: Printing on demand
Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever find them, thereby enabling a... Lees verder
89
€ 42,30
Intrusion Prevention and Active Response
Deploying Network and Host IPS
Engels , E-book, 04-03-2005Levertijd: Printing on demand
This book provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response technologies such as port deactivation, firewall/router network l... Lees verder
90
€ 42,30
Configuring SonicWALL Firewalls
Engels , E-book, 25-05-2006Levertijd: Printing on demand
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL firewall appliance has had the largest annual growth in the security appliance sector for the last two y... Lees verder
91
€ 42,30
Security Log Management
Identifying Patterns in the Chaos
Engels , E-book, 27-01-2006Levertijd: Printing on demand
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the Top 10 security logs that... Lees verder
92
€ 42,30
Combating Spyware in the Enterprise
Discover, Detect, and Eradicate the Internet's Greatest Threat
Engels , E-book, 04-08-2006Levertijd: Printing on demand
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the in... Lees verder
93
€ 73,75
HP Technologies, Mission-Critical Microsoft Exchange 2000
Building Highly-Available Messaging and Knowledge Management Systems
Engels , E-book, 22-01-2001Levertijd: Printing on demand
"e;Mission-Critical Microsoft Exchange 2000"e; is the definitive book on how to design and maintain extremely reliable and adaptive Exchange Server messaging systems that rarely crash and that preserve valuable data and services in spite of technical disruptions. E-mail systems are now a pri... Lees verder
94
€ 73,75
IM Instant Messaging Security
Engels , E-book, 19-07-2005Levertijd: Printing on demand
Instant messaging is popular, fast and dangerous to business networks. This is how systems managers should deal with it. Lees verder
95
€ 51,95
Developing Practical Wireless Applications
Engels , E-book, 08-04-2011Levertijd: Printing on demand
The continuing emergence of wireless communication technologies, each announcing a new range of capabilities and ease-of-use, raises the question of whether manufacturers are using the right technology for the right product. This book explores this questi Lees verder
96
€ 42,30
WarDriving: Drive, Detect, Defend
A Guide to Wireless Security
Engels , E-book, 02-04-2004Levertijd: Printing on demand
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, securi... Lees verder
97
€ 68,90
Information Assurance
Managing Organizational IT Security Risks
Engels , E-book, 25-06-2002Levertijd: Printing on demand
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential... Lees verder
98
€ 42,30
How to Cheat, How to Cheat at Administering Office Communications Server 2007
2007
Engels , E-book, 18-04-2011Levertijd: Printing on demand
The perfect reference for the multitasked admin tasked with mastering a major new product release. Lees verder
99
€ 50,75
Managing Catastrophic Loss of Sensitive Data
A Guide for IT and Security Professionals
Engels , E-book, 18-04-2011Levertijd: Printing on demand
With one significant data loss event reported every two days, this is the first book to specifically address the consequences of and steps for recovery from a catastrophic loss of sensitive data. Lees verder
100
€ 50,75
OS X Exploits and Defense
Own it...Just Like Windows or Linux!
Engels , E-book, 18-04-2011Levertijd: Printing on demand
Historically, the Apple Macintosh OS X operating system has received little attention in the security industry. This trend is changing. In the past year, Apple has issued more than 100 security patches for OS X, underscoring the fact that it not a foolproof operating system. The National Vulnerabili... Lees verder
101
€ 50,75
Digital Press Storage Technologies, Designing Storage for Exchange 2007 SP1
Engels , E-book, 08-04-2011Levertijd: Printing on demand
Not provided Lees verder
102
€ 72,55
Microsoft Exchange Server 2003, Deployment and Migration SP1 and SP2
Engels , E-book, 26-09-2006Levertijd: Printing on demand
Exchange Server is necessary to support Outlook and SharePoint in the enterprise messaging at virtually all Fortune 1000 firms. Microsoft(r) Exchange Server 2003 SP1 and SP2 Deployment and Migration describes everything that you need to know about designing, planning, and implementing an Exchange 2... Lees verder
103
€ 71,35
Firewalls
Jumpstart for Network and Systems Administrators
Engels , E-book, 21-12-2004Levertijd: Printing on demand
Security advice for any organization from a consultant with decades of experience Lees verder