Securing the virtual environment how to defend the enterprise against attack /
Saved in:
Main Author: | Ottenheimer, Davi |
---|---|
Corporate Author: | ebrary, Inc |
Other Authors: | Wallace, Matthew |
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis, IN :
John Wiley & Sons,
c2012.
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Information security governance simplified from the boardroom to the keyboard /
by: Fitzgerald, Todd
Published: (2012)
by: Fitzgerald, Todd
Published: (2012)
Realizing the information future the Internet and beyond /
Published: (1994)
Published: (1994)
Aspects of network and information security
Published: (2008)
Published: (2008)
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Published: (2010)
Published: (2010)
Virtual private networking a construction, operation and utilization guide /
by: Held, Gilbert, 1943-
Published: (2004)
by: Held, Gilbert, 1943-
Published: (2004)
The sustainable IT architecture the progressive way of overhauling information systems with SOA /
by: Bonnet, Pierre, 1967-
Published: (2009)
by: Bonnet, Pierre, 1967-
Published: (2009)
Content networking architecture, protocols, and practice /
by: Hofmann, Markus
Published: (2005)
by: Hofmann, Markus
Published: (2005)
Building virtual communities learning and change in cyberspace /
Published: (2002)
Published: (2002)
Security configuration in a TCP/IP Sysplex environment
Published: (2003)
Published: (2003)
Security log management identifying patterns in the chaos /
by: Babbin, Jacob
Published: (2006)
by: Babbin, Jacob
Published: (2006)
How to cheat at managing information security
by: Osborne, Mark
Published: (2006)
by: Osborne, Mark
Published: (2006)
Building a virtual private network
by: Gupta, Meeta
Published: (2003)
by: Gupta, Meeta
Published: (2003)
Selected papers from the 4th international network conference 2004 Plymouth UK
Published: (2004)
Published: (2004)
Security data visualization graphical techniques for network analysis /
by: Conti, Greg
Published: (2007)
by: Conti, Greg
Published: (2007)
Managing Cisco network security
Published: (2002)
Published: (2002)
A technical guide to IPSec virtual private networks
by: Tiller, James S.
Published: (2001)
by: Tiller, James S.
Published: (2001)
SOA governance the key to successful SOA adoption in your organization /
by: Biske, Todd
Published: (2008)
by: Biske, Todd
Published: (2008)
Nagios Core administration cookbook develop an integrated monitoring solution for virtually any kind of network /
by: Ryder, Tom
Published: (2013)
by: Ryder, Tom
Published: (2013)
Role engineering for enterprise security management
by: Coyne, Edward J., PhD
Published: (2008)
by: Coyne, Edward J., PhD
Published: (2008)
Network know-how an essential guide for the accidental admin /
by: Ross, John, 1947-
Published: (2009)
by: Ross, John, 1947-
Published: (2009)
Integrating netware into the enterprise network /
by: Ziegler, Kurt
Published: (1994)
by: Ziegler, Kurt
Published: (1994)
Telecommunication Economics Selected Results of the COST Action ISO605 Econ@Tel /
Published: (2012)
Published: (2012)
Nokia Network security solutions handbook /
by: Maxwell, Douglas D.
Published: (2002)
by: Maxwell, Douglas D.
Published: (2002)
Web 2.0 & Semantic Web
by: Devedi, Vladan
Published: (2009)
by: Devedi, Vladan
Published: (2009)
Software defined mobile networks (SDMN) : beyond LTE network architecture /
Published: (2015)
Published: (2015)
Software defined networks : a comprehensive approach /
by: Goransson, Paul, et al.
Published: (2014)
by: Goransson, Paul, et al.
Published: (2014)
NGN architectures, protocols and services /
by: Janevski, Toni
Published: (2014)
by: Janevski, Toni
Published: (2014)
Integrated security systems design concepts, specifications, and implementation /
by: Norman, Thomas L.
Published: (2007)
by: Norman, Thomas L.
Published: (2007)
Introduction to network security
by: Krawetz, Neal
Published: (2007)
by: Krawetz, Neal
Published: (2007)
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
by: Cardwell, Kevin
Published: (2014)
by: Cardwell, Kevin
Published: (2014)
Data storage networking : real world skills for the comptia storage+TM certification /
by: Minx
Published: (2014)
by: Minx
Published: (2014)
Publish/subscribe systems design and principles /
by: Tarkoma, Sasu
Published: (2012)
by: Tarkoma, Sasu
Published: (2012)
Implementing NAP and NAC security technologies the complete guide to network access control /
by: Hoffman, Daniel (Daniel V.), 1972-
Published: (2008)
by: Hoffman, Daniel (Daniel V.), 1972-
Published: (2008)
Learning Nagios 4 : learn how to set up Nagios 4 in order to monitor your systems efficiently /
by: Kocjan, Wojciech
Published: (2014)
by: Kocjan, Wojciech
Published: (2014)
Installation and maintenance of SDH/SONET, ATM, xDSL, and synchronization networks
Published: (2003)
Published: (2003)
Cisco security specialist's guide to PIX Firewall
by: Osipov, Vitaly
Published: (2002)
by: Osipov, Vitaly
Published: (2002)
Cisco security
by: Bhatnagar, Kartik
Published: (2002)
by: Bhatnagar, Kartik
Published: (2002)
Network security /
by: Perez, Andre
Published: (2014)
by: Perez, Andre
Published: (2014)
Wireshark essentials : get up and running with Wireshark to analyze network packets and protocols effectively /
by: Baxter, James H.
Published: (2014)
by: Baxter, James H.
Published: (2014)
The International Handbook of Virtual Learning Environments
by: Weiss, Joel
Published: (2006)
by: Weiss, Joel
Published: (2006)
Similar Items
-
Information security governance simplified from the boardroom to the keyboard /
by: Fitzgerald, Todd
Published: (2012) -
Realizing the information future the Internet and beyond /
Published: (1994) -
Aspects of network and information security
Published: (2008) -
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Published: (2010) -
Virtual private networking a construction, operation and utilization guide /
by: Held, Gilbert, 1943-
Published: (2004)