Securing the virtual environment how to defend the enterprise against attack /
Na minha lista:
Autor principal: | Ottenheimer, Davi |
---|---|
Autor Corporativo: | ebrary, Inc |
Outros Autores: | Wallace, Matthew |
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês |
Publicado em: |
Indianapolis, IN :
John Wiley & Sons,
c2012.
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Information security governance simplified from the boardroom to the keyboard /
Por: Fitzgerald, Todd
Publicado em: (2012)
Por: Fitzgerald, Todd
Publicado em: (2012)
Realizing the information future the Internet and beyond /
Publicado em: (1994)
Publicado em: (1994)
Aspects of network and information security
Publicado em: (2008)
Publicado em: (2008)
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Publicado em: (2010)
Publicado em: (2010)
Virtual private networking a construction, operation and utilization guide /
Por: Held, Gilbert, 1943-
Publicado em: (2004)
Por: Held, Gilbert, 1943-
Publicado em: (2004)
The sustainable IT architecture the progressive way of overhauling information systems with SOA /
Por: Bonnet, Pierre, 1967-
Publicado em: (2009)
Por: Bonnet, Pierre, 1967-
Publicado em: (2009)
Content networking architecture, protocols, and practice /
Por: Hofmann, Markus
Publicado em: (2005)
Por: Hofmann, Markus
Publicado em: (2005)
Building virtual communities learning and change in cyberspace /
Publicado em: (2002)
Publicado em: (2002)
Security configuration in a TCP/IP Sysplex environment
Publicado em: (2003)
Publicado em: (2003)
Security log management identifying patterns in the chaos /
Por: Babbin, Jacob
Publicado em: (2006)
Por: Babbin, Jacob
Publicado em: (2006)
How to cheat at managing information security
Por: Osborne, Mark
Publicado em: (2006)
Por: Osborne, Mark
Publicado em: (2006)
Building a virtual private network
Por: Gupta, Meeta
Publicado em: (2003)
Por: Gupta, Meeta
Publicado em: (2003)
Selected papers from the 4th international network conference 2004 Plymouth UK
Publicado em: (2004)
Publicado em: (2004)
Security data visualization graphical techniques for network analysis /
Por: Conti, Greg
Publicado em: (2007)
Por: Conti, Greg
Publicado em: (2007)
Managing Cisco network security
Publicado em: (2002)
Publicado em: (2002)
A technical guide to IPSec virtual private networks
Por: Tiller, James S.
Publicado em: (2001)
Por: Tiller, James S.
Publicado em: (2001)
SOA governance the key to successful SOA adoption in your organization /
Por: Biske, Todd
Publicado em: (2008)
Por: Biske, Todd
Publicado em: (2008)
Nagios Core administration cookbook develop an integrated monitoring solution for virtually any kind of network /
Por: Ryder, Tom
Publicado em: (2013)
Por: Ryder, Tom
Publicado em: (2013)
Role engineering for enterprise security management
Por: Coyne, Edward J., PhD
Publicado em: (2008)
Por: Coyne, Edward J., PhD
Publicado em: (2008)
Network know-how an essential guide for the accidental admin /
Por: Ross, John, 1947-
Publicado em: (2009)
Por: Ross, John, 1947-
Publicado em: (2009)
Integrating netware into the enterprise network /
Por: Ziegler, Kurt
Publicado em: (1994)
Por: Ziegler, Kurt
Publicado em: (1994)
Telecommunication Economics Selected Results of the COST Action ISO605 Econ@Tel /
Publicado em: (2012)
Publicado em: (2012)
Nokia Network security solutions handbook /
Por: Maxwell, Douglas D.
Publicado em: (2002)
Por: Maxwell, Douglas D.
Publicado em: (2002)
Web 2.0 & Semantic Web
Por: Devedi, Vladan
Publicado em: (2009)
Por: Devedi, Vladan
Publicado em: (2009)
Software defined mobile networks (SDMN) : beyond LTE network architecture /
Publicado em: (2015)
Publicado em: (2015)
Software defined networks : a comprehensive approach /
Por: Goransson, Paul, et al.
Publicado em: (2014)
Por: Goransson, Paul, et al.
Publicado em: (2014)
NGN architectures, protocols and services /
Por: Janevski, Toni
Publicado em: (2014)
Por: Janevski, Toni
Publicado em: (2014)
Integrated security systems design concepts, specifications, and implementation /
Por: Norman, Thomas L.
Publicado em: (2007)
Por: Norman, Thomas L.
Publicado em: (2007)
Introduction to network security
Por: Krawetz, Neal
Publicado em: (2007)
Por: Krawetz, Neal
Publicado em: (2007)
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
Por: Cardwell, Kevin
Publicado em: (2014)
Por: Cardwell, Kevin
Publicado em: (2014)
Publish/subscribe systems design and principles /
Por: Tarkoma, Sasu
Publicado em: (2012)
Por: Tarkoma, Sasu
Publicado em: (2012)
Implementing NAP and NAC security technologies the complete guide to network access control /
Por: Hoffman, Daniel (Daniel V.), 1972-
Publicado em: (2008)
Por: Hoffman, Daniel (Daniel V.), 1972-
Publicado em: (2008)
Data storage networking : real world skills for the comptia storage+TM certification /
Por: Minx
Publicado em: (2014)
Por: Minx
Publicado em: (2014)
Learning Nagios 4 : learn how to set up Nagios 4 in order to monitor your systems efficiently /
Por: Kocjan, Wojciech
Publicado em: (2014)
Por: Kocjan, Wojciech
Publicado em: (2014)
Installation and maintenance of SDH/SONET, ATM, xDSL, and synchronization networks
Publicado em: (2003)
Publicado em: (2003)
Cisco security specialist's guide to PIX Firewall
Por: Osipov, Vitaly
Publicado em: (2002)
Por: Osipov, Vitaly
Publicado em: (2002)
Cisco security
Por: Bhatnagar, Kartik
Publicado em: (2002)
Por: Bhatnagar, Kartik
Publicado em: (2002)
Network security /
Por: Perez, Andre
Publicado em: (2014)
Por: Perez, Andre
Publicado em: (2014)
Wireshark essentials : get up and running with Wireshark to analyze network packets and protocols effectively /
Por: Baxter, James H.
Publicado em: (2014)
Por: Baxter, James H.
Publicado em: (2014)
LANs to WANs the complete management guide /
Por: Muller, Nathan J.
Publicado em: (2003)
Por: Muller, Nathan J.
Publicado em: (2003)
Registos relacionados
-
Information security governance simplified from the boardroom to the keyboard /
Por: Fitzgerald, Todd
Publicado em: (2012) -
Realizing the information future the Internet and beyond /
Publicado em: (1994) -
Aspects of network and information security
Publicado em: (2008) -
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Publicado em: (2010) -
Virtual private networking a construction, operation and utilization guide /
Por: Held, Gilbert, 1943-
Publicado em: (2004)