Securing the virtual environment how to defend the enterprise against attack /
Sábháilte in:
Príomhchruthaitheoir: | Ottenheimer, Davi |
---|---|
Údar corparáideach: | ebrary, Inc |
Rannpháirtithe: | Wallace, Matthew |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
Indianapolis, IN :
John Wiley & Sons,
c2012.
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Information security governance simplified from the boardroom to the keyboard /
de réir: Fitzgerald, Todd
Foilsithe / Cruthaithe: (2012)
de réir: Fitzgerald, Todd
Foilsithe / Cruthaithe: (2012)
Realizing the information future the Internet and beyond /
Foilsithe / Cruthaithe: (1994)
Foilsithe / Cruthaithe: (1994)
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Aspects of network and information security
Foilsithe / Cruthaithe: (2008)
Foilsithe / Cruthaithe: (2008)
Virtual private networking a construction, operation and utilization guide /
de réir: Held, Gilbert, 1943-
Foilsithe / Cruthaithe: (2004)
de réir: Held, Gilbert, 1943-
Foilsithe / Cruthaithe: (2004)
The sustainable IT architecture the progressive way of overhauling information systems with SOA /
de réir: Bonnet, Pierre, 1967-
Foilsithe / Cruthaithe: (2009)
de réir: Bonnet, Pierre, 1967-
Foilsithe / Cruthaithe: (2009)
Content networking architecture, protocols, and practice /
de réir: Hofmann, Markus
Foilsithe / Cruthaithe: (2005)
de réir: Hofmann, Markus
Foilsithe / Cruthaithe: (2005)
Building virtual communities learning and change in cyberspace /
Foilsithe / Cruthaithe: (2002)
Foilsithe / Cruthaithe: (2002)
Security configuration in a TCP/IP Sysplex environment
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
Security log management identifying patterns in the chaos /
de réir: Babbin, Jacob
Foilsithe / Cruthaithe: (2006)
de réir: Babbin, Jacob
Foilsithe / Cruthaithe: (2006)
How to cheat at managing information security
de réir: Osborne, Mark
Foilsithe / Cruthaithe: (2006)
de réir: Osborne, Mark
Foilsithe / Cruthaithe: (2006)
Selected papers from the 4th international network conference 2004 Plymouth UK
Foilsithe / Cruthaithe: (2004)
Foilsithe / Cruthaithe: (2004)
Building a virtual private network
de réir: Gupta, Meeta
Foilsithe / Cruthaithe: (2003)
de réir: Gupta, Meeta
Foilsithe / Cruthaithe: (2003)
Security data visualization graphical techniques for network analysis /
de réir: Conti, Greg
Foilsithe / Cruthaithe: (2007)
de réir: Conti, Greg
Foilsithe / Cruthaithe: (2007)
Managing Cisco network security
Foilsithe / Cruthaithe: (2002)
Foilsithe / Cruthaithe: (2002)
A technical guide to IPSec virtual private networks
de réir: Tiller, James S.
Foilsithe / Cruthaithe: (2001)
de réir: Tiller, James S.
Foilsithe / Cruthaithe: (2001)
SOA governance the key to successful SOA adoption in your organization /
de réir: Biske, Todd
Foilsithe / Cruthaithe: (2008)
de réir: Biske, Todd
Foilsithe / Cruthaithe: (2008)
Role engineering for enterprise security management
de réir: Coyne, Edward J., PhD
Foilsithe / Cruthaithe: (2008)
de réir: Coyne, Edward J., PhD
Foilsithe / Cruthaithe: (2008)
Nagios Core administration cookbook develop an integrated monitoring solution for virtually any kind of network /
de réir: Ryder, Tom
Foilsithe / Cruthaithe: (2013)
de réir: Ryder, Tom
Foilsithe / Cruthaithe: (2013)
Network know-how an essential guide for the accidental admin /
de réir: Ross, John, 1947-
Foilsithe / Cruthaithe: (2009)
de réir: Ross, John, 1947-
Foilsithe / Cruthaithe: (2009)
Integrating netware into the enterprise network /
de réir: Ziegler, Kurt
Foilsithe / Cruthaithe: (1994)
de réir: Ziegler, Kurt
Foilsithe / Cruthaithe: (1994)
Telecommunication Economics Selected Results of the COST Action ISO605 Econ@Tel /
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Nokia Network security solutions handbook /
de réir: Maxwell, Douglas D.
Foilsithe / Cruthaithe: (2002)
de réir: Maxwell, Douglas D.
Foilsithe / Cruthaithe: (2002)
Web 2.0 & Semantic Web
de réir: Devedi, Vladan
Foilsithe / Cruthaithe: (2009)
de réir: Devedi, Vladan
Foilsithe / Cruthaithe: (2009)
Software defined mobile networks (SDMN) : beyond LTE network architecture /
Foilsithe / Cruthaithe: (2015)
Foilsithe / Cruthaithe: (2015)
Software defined networks : a comprehensive approach /
de réir: Goransson, Paul, et al.
Foilsithe / Cruthaithe: (2014)
de réir: Goransson, Paul, et al.
Foilsithe / Cruthaithe: (2014)
NGN architectures, protocols and services /
de réir: Janevski, Toni
Foilsithe / Cruthaithe: (2014)
de réir: Janevski, Toni
Foilsithe / Cruthaithe: (2014)
Integrated security systems design concepts, specifications, and implementation /
de réir: Norman, Thomas L.
Foilsithe / Cruthaithe: (2007)
de réir: Norman, Thomas L.
Foilsithe / Cruthaithe: (2007)
Introduction to network security
de réir: Krawetz, Neal
Foilsithe / Cruthaithe: (2007)
de réir: Krawetz, Neal
Foilsithe / Cruthaithe: (2007)
Publish/subscribe systems design and principles /
de réir: Tarkoma, Sasu
Foilsithe / Cruthaithe: (2012)
de réir: Tarkoma, Sasu
Foilsithe / Cruthaithe: (2012)
Data storage networking : real world skills for the comptia storage+TM certification /
de réir: Minx
Foilsithe / Cruthaithe: (2014)
de réir: Minx
Foilsithe / Cruthaithe: (2014)
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
de réir: Cardwell, Kevin
Foilsithe / Cruthaithe: (2014)
de réir: Cardwell, Kevin
Foilsithe / Cruthaithe: (2014)
Learning Nagios 4 : learn how to set up Nagios 4 in order to monitor your systems efficiently /
de réir: Kocjan, Wojciech
Foilsithe / Cruthaithe: (2014)
de réir: Kocjan, Wojciech
Foilsithe / Cruthaithe: (2014)
Implementing NAP and NAC security technologies the complete guide to network access control /
de réir: Hoffman, Daniel (Daniel V.), 1972-
Foilsithe / Cruthaithe: (2008)
de réir: Hoffman, Daniel (Daniel V.), 1972-
Foilsithe / Cruthaithe: (2008)
Installation and maintenance of SDH/SONET, ATM, xDSL, and synchronization networks
Foilsithe / Cruthaithe: (2003)
Foilsithe / Cruthaithe: (2003)
The International Handbook of Virtual Learning Environments
de réir: Weiss, Joel
Foilsithe / Cruthaithe: (2006)
de réir: Weiss, Joel
Foilsithe / Cruthaithe: (2006)
Cisco security specialist's guide to PIX Firewall
de réir: Osipov, Vitaly
Foilsithe / Cruthaithe: (2002)
de réir: Osipov, Vitaly
Foilsithe / Cruthaithe: (2002)
Wireshark essentials : get up and running with Wireshark to analyze network packets and protocols effectively /
de réir: Baxter, James H.
Foilsithe / Cruthaithe: (2014)
de réir: Baxter, James H.
Foilsithe / Cruthaithe: (2014)
Cisco security
de réir: Bhatnagar, Kartik
Foilsithe / Cruthaithe: (2002)
de réir: Bhatnagar, Kartik
Foilsithe / Cruthaithe: (2002)
Network security /
de réir: Perez, Andre
Foilsithe / Cruthaithe: (2014)
de réir: Perez, Andre
Foilsithe / Cruthaithe: (2014)
Míreanna comhchosúla
-
Information security governance simplified from the boardroom to the keyboard /
de réir: Fitzgerald, Todd
Foilsithe / Cruthaithe: (2012) -
Realizing the information future the Internet and beyond /
Foilsithe / Cruthaithe: (1994) -
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Foilsithe / Cruthaithe: (2010) -
Aspects of network and information security
Foilsithe / Cruthaithe: (2008) -
Virtual private networking a construction, operation and utilization guide /
de réir: Held, Gilbert, 1943-
Foilsithe / Cruthaithe: (2004)