Securing the virtual environment how to defend the enterprise against attack /
Shranjeno v:
Glavni avtor: | Ottenheimer, Davi |
---|---|
Korporativna značnica: | ebrary, Inc |
Drugi avtorji: | Wallace, Matthew |
Format: | Elektronski eKnjiga |
Jezik: | angleščina |
Izdano: |
Indianapolis, IN :
John Wiley & Sons,
c2012.
|
Teme: | |
Online dostop: | An electronic book accessible through the World Wide Web; click to view |
Oznake: |
Označite
Brez oznak, prvi označite!
|
Podobne knjige/članki
Information security governance simplified from the boardroom to the keyboard /
od: Fitzgerald, Todd
Izdano: (2012)
od: Fitzgerald, Todd
Izdano: (2012)
Realizing the information future the Internet and beyond /
Izdano: (1994)
Izdano: (1994)
Aspects of network and information security
Izdano: (2008)
Izdano: (2008)
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Izdano: (2010)
Izdano: (2010)
Virtual private networking a construction, operation and utilization guide /
od: Held, Gilbert, 1943-
Izdano: (2004)
od: Held, Gilbert, 1943-
Izdano: (2004)
The sustainable IT architecture the progressive way of overhauling information systems with SOA /
od: Bonnet, Pierre, 1967-
Izdano: (2009)
od: Bonnet, Pierre, 1967-
Izdano: (2009)
Content networking architecture, protocols, and practice /
od: Hofmann, Markus
Izdano: (2005)
od: Hofmann, Markus
Izdano: (2005)
Building virtual communities learning and change in cyberspace /
Izdano: (2002)
Izdano: (2002)
Security configuration in a TCP/IP Sysplex environment
Izdano: (2003)
Izdano: (2003)
Security log management identifying patterns in the chaos /
od: Babbin, Jacob
Izdano: (2006)
od: Babbin, Jacob
Izdano: (2006)
Building a virtual private network
od: Gupta, Meeta
Izdano: (2003)
od: Gupta, Meeta
Izdano: (2003)
How to cheat at managing information security
od: Osborne, Mark
Izdano: (2006)
od: Osborne, Mark
Izdano: (2006)
Selected papers from the 4th international network conference 2004 Plymouth UK
Izdano: (2004)
Izdano: (2004)
Security data visualization graphical techniques for network analysis /
od: Conti, Greg
Izdano: (2007)
od: Conti, Greg
Izdano: (2007)
Managing Cisco network security
Izdano: (2002)
Izdano: (2002)
A technical guide to IPSec virtual private networks
od: Tiller, James S.
Izdano: (2001)
od: Tiller, James S.
Izdano: (2001)
SOA governance the key to successful SOA adoption in your organization /
od: Biske, Todd
Izdano: (2008)
od: Biske, Todd
Izdano: (2008)
Nagios Core administration cookbook develop an integrated monitoring solution for virtually any kind of network /
od: Ryder, Tom
Izdano: (2013)
od: Ryder, Tom
Izdano: (2013)
Role engineering for enterprise security management
od: Coyne, Edward J., PhD
Izdano: (2008)
od: Coyne, Edward J., PhD
Izdano: (2008)
Network know-how an essential guide for the accidental admin /
od: Ross, John, 1947-
Izdano: (2009)
od: Ross, John, 1947-
Izdano: (2009)
Integrating netware into the enterprise network /
od: Ziegler, Kurt
Izdano: (1994)
od: Ziegler, Kurt
Izdano: (1994)
Telecommunication Economics Selected Results of the COST Action ISO605 Econ@Tel /
Izdano: (2012)
Izdano: (2012)
Nokia Network security solutions handbook /
od: Maxwell, Douglas D.
Izdano: (2002)
od: Maxwell, Douglas D.
Izdano: (2002)
Web 2.0 & Semantic Web
od: Devedi, Vladan
Izdano: (2009)
od: Devedi, Vladan
Izdano: (2009)
Software defined mobile networks (SDMN) : beyond LTE network architecture /
Izdano: (2015)
Izdano: (2015)
Software defined networks : a comprehensive approach /
od: Goransson, Paul, et al.
Izdano: (2014)
od: Goransson, Paul, et al.
Izdano: (2014)
NGN architectures, protocols and services /
od: Janevski, Toni
Izdano: (2014)
od: Janevski, Toni
Izdano: (2014)
Integrated security systems design concepts, specifications, and implementation /
od: Norman, Thomas L.
Izdano: (2007)
od: Norman, Thomas L.
Izdano: (2007)
Introduction to network security
od: Krawetz, Neal
Izdano: (2007)
od: Krawetz, Neal
Izdano: (2007)
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
od: Cardwell, Kevin
Izdano: (2014)
od: Cardwell, Kevin
Izdano: (2014)
Publish/subscribe systems design and principles /
od: Tarkoma, Sasu
Izdano: (2012)
od: Tarkoma, Sasu
Izdano: (2012)
Data storage networking : real world skills for the comptia storage+TM certification /
od: Minx
Izdano: (2014)
od: Minx
Izdano: (2014)
Implementing NAP and NAC security technologies the complete guide to network access control /
od: Hoffman, Daniel (Daniel V.), 1972-
Izdano: (2008)
od: Hoffman, Daniel (Daniel V.), 1972-
Izdano: (2008)
Learning Nagios 4 : learn how to set up Nagios 4 in order to monitor your systems efficiently /
od: Kocjan, Wojciech
Izdano: (2014)
od: Kocjan, Wojciech
Izdano: (2014)
Installation and maintenance of SDH/SONET, ATM, xDSL, and synchronization networks
Izdano: (2003)
Izdano: (2003)
Cisco security specialist's guide to PIX Firewall
od: Osipov, Vitaly
Izdano: (2002)
od: Osipov, Vitaly
Izdano: (2002)
Cisco security
od: Bhatnagar, Kartik
Izdano: (2002)
od: Bhatnagar, Kartik
Izdano: (2002)
Wireshark essentials : get up and running with Wireshark to analyze network packets and protocols effectively /
od: Baxter, James H.
Izdano: (2014)
od: Baxter, James H.
Izdano: (2014)
Network security /
od: Perez, Andre
Izdano: (2014)
od: Perez, Andre
Izdano: (2014)
LANs to WANs the complete management guide /
od: Muller, Nathan J.
Izdano: (2003)
od: Muller, Nathan J.
Izdano: (2003)
Podobne knjige/članki
-
Information security governance simplified from the boardroom to the keyboard /
od: Fitzgerald, Todd
Izdano: (2012) -
Realizing the information future the Internet and beyond /
Izdano: (1994) -
Aspects of network and information security
Izdano: (2008) -
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Izdano: (2010) -
Virtual private networking a construction, operation and utilization guide /
od: Held, Gilbert, 1943-
Izdano: (2004)