Securing the virtual environment how to defend the enterprise against attack /
Zapisane w:
1. autor: | Ottenheimer, Davi |
---|---|
Korporacja: | ebrary, Inc |
Kolejni autorzy: | Wallace, Matthew |
Format: | Elektroniczne E-book |
Język: | angielski |
Wydane: |
Indianapolis, IN :
John Wiley & Sons,
c2012.
|
Hasła przedmiotowe: | |
Dostęp online: | An electronic book accessible through the World Wide Web; click to view |
Etykiety: |
Dodaj etykietę
Nie ma etykietki, Dołącz pierwszą etykiete!
|
Podobne zapisy
Information security governance simplified from the boardroom to the keyboard /
od: Fitzgerald, Todd
Wydane: (2012)
od: Fitzgerald, Todd
Wydane: (2012)
Realizing the information future the Internet and beyond /
Wydane: (1994)
Wydane: (1994)
Aspects of network and information security
Wydane: (2008)
Wydane: (2008)
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Wydane: (2010)
Wydane: (2010)
Virtual private networking a construction, operation and utilization guide /
od: Held, Gilbert, 1943-
Wydane: (2004)
od: Held, Gilbert, 1943-
Wydane: (2004)
The sustainable IT architecture the progressive way of overhauling information systems with SOA /
od: Bonnet, Pierre, 1967-
Wydane: (2009)
od: Bonnet, Pierre, 1967-
Wydane: (2009)
Content networking architecture, protocols, and practice /
od: Hofmann, Markus
Wydane: (2005)
od: Hofmann, Markus
Wydane: (2005)
Building virtual communities learning and change in cyberspace /
Wydane: (2002)
Wydane: (2002)
Security configuration in a TCP/IP Sysplex environment
Wydane: (2003)
Wydane: (2003)
Security log management identifying patterns in the chaos /
od: Babbin, Jacob
Wydane: (2006)
od: Babbin, Jacob
Wydane: (2006)
Selected papers from the 4th international network conference 2004 Plymouth UK
Wydane: (2004)
Wydane: (2004)
How to cheat at managing information security
od: Osborne, Mark
Wydane: (2006)
od: Osborne, Mark
Wydane: (2006)
Building a virtual private network
od: Gupta, Meeta
Wydane: (2003)
od: Gupta, Meeta
Wydane: (2003)
Security data visualization graphical techniques for network analysis /
od: Conti, Greg
Wydane: (2007)
od: Conti, Greg
Wydane: (2007)
Managing Cisco network security
Wydane: (2002)
Wydane: (2002)
A technical guide to IPSec virtual private networks
od: Tiller, James S.
Wydane: (2001)
od: Tiller, James S.
Wydane: (2001)
SOA governance the key to successful SOA adoption in your organization /
od: Biske, Todd
Wydane: (2008)
od: Biske, Todd
Wydane: (2008)
Nagios Core administration cookbook develop an integrated monitoring solution for virtually any kind of network /
od: Ryder, Tom
Wydane: (2013)
od: Ryder, Tom
Wydane: (2013)
Role engineering for enterprise security management
od: Coyne, Edward J., PhD
Wydane: (2008)
od: Coyne, Edward J., PhD
Wydane: (2008)
Network know-how an essential guide for the accidental admin /
od: Ross, John, 1947-
Wydane: (2009)
od: Ross, John, 1947-
Wydane: (2009)
Integrating netware into the enterprise network /
od: Ziegler, Kurt
Wydane: (1994)
od: Ziegler, Kurt
Wydane: (1994)
Telecommunication Economics Selected Results of the COST Action ISO605 Econ@Tel /
Wydane: (2012)
Wydane: (2012)
Nokia Network security solutions handbook /
od: Maxwell, Douglas D.
Wydane: (2002)
od: Maxwell, Douglas D.
Wydane: (2002)
Web 2.0 & Semantic Web
od: Devedi, Vladan
Wydane: (2009)
od: Devedi, Vladan
Wydane: (2009)
Software defined networks : a comprehensive approach /
od: Goransson, Paul, i wsp.
Wydane: (2014)
od: Goransson, Paul, i wsp.
Wydane: (2014)
Software defined mobile networks (SDMN) : beyond LTE network architecture /
Wydane: (2015)
Wydane: (2015)
NGN architectures, protocols and services /
od: Janevski, Toni
Wydane: (2014)
od: Janevski, Toni
Wydane: (2014)
Integrated security systems design concepts, specifications, and implementation /
od: Norman, Thomas L.
Wydane: (2007)
od: Norman, Thomas L.
Wydane: (2007)
Introduction to network security
od: Krawetz, Neal
Wydane: (2007)
od: Krawetz, Neal
Wydane: (2007)
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
od: Cardwell, Kevin
Wydane: (2014)
od: Cardwell, Kevin
Wydane: (2014)
Publish/subscribe systems design and principles /
od: Tarkoma, Sasu
Wydane: (2012)
od: Tarkoma, Sasu
Wydane: (2012)
Data storage networking : real world skills for the comptia storage+TM certification /
od: Minx
Wydane: (2014)
od: Minx
Wydane: (2014)
Implementing NAP and NAC security technologies the complete guide to network access control /
od: Hoffman, Daniel (Daniel V.), 1972-
Wydane: (2008)
od: Hoffman, Daniel (Daniel V.), 1972-
Wydane: (2008)
Learning Nagios 4 : learn how to set up Nagios 4 in order to monitor your systems efficiently /
od: Kocjan, Wojciech
Wydane: (2014)
od: Kocjan, Wojciech
Wydane: (2014)
Installation and maintenance of SDH/SONET, ATM, xDSL, and synchronization networks
Wydane: (2003)
Wydane: (2003)
Cisco security specialist's guide to PIX Firewall
od: Osipov, Vitaly
Wydane: (2002)
od: Osipov, Vitaly
Wydane: (2002)
Cisco security
od: Bhatnagar, Kartik
Wydane: (2002)
od: Bhatnagar, Kartik
Wydane: (2002)
Network security /
od: Perez, Andre
Wydane: (2014)
od: Perez, Andre
Wydane: (2014)
Wireshark essentials : get up and running with Wireshark to analyze network packets and protocols effectively /
od: Baxter, James H.
Wydane: (2014)
od: Baxter, James H.
Wydane: (2014)
LANs to WANs the complete management guide /
od: Muller, Nathan J.
Wydane: (2003)
od: Muller, Nathan J.
Wydane: (2003)
Podobne zapisy
-
Information security governance simplified from the boardroom to the keyboard /
od: Fitzgerald, Todd
Wydane: (2012) -
Realizing the information future the Internet and beyond /
Wydane: (1994) -
Aspects of network and information security
Wydane: (2008) -
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Wydane: (2010) -
Virtual private networking a construction, operation and utilization guide /
od: Held, Gilbert, 1943-
Wydane: (2004)