Securing the virtual environment how to defend the enterprise against attack /
Guardado en:
Autor principal: | Ottenheimer, Davi |
---|---|
Autor Corporativo: | ebrary, Inc |
Otros Autores: | Wallace, Matthew |
Formato: | Electrónico eBook |
Lenguaje: | inglés |
Publicado: |
Indianapolis, IN :
John Wiley & Sons,
c2012.
|
Materias: | |
Acceso en línea: | An electronic book accessible through the World Wide Web; click to view |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
Ejemplares similares
Information security governance simplified from the boardroom to the keyboard /
por: Fitzgerald, Todd
Publicado: (2012)
por: Fitzgerald, Todd
Publicado: (2012)
Realizing the information future the Internet and beyond /
Publicado: (1994)
Publicado: (1994)
Aspects of network and information security
Publicado: (2008)
Publicado: (2008)
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Publicado: (2010)
Publicado: (2010)
Virtual private networking a construction, operation and utilization guide /
por: Held, Gilbert, 1943-
Publicado: (2004)
por: Held, Gilbert, 1943-
Publicado: (2004)
The sustainable IT architecture the progressive way of overhauling information systems with SOA /
por: Bonnet, Pierre, 1967-
Publicado: (2009)
por: Bonnet, Pierre, 1967-
Publicado: (2009)
Content networking architecture, protocols, and practice /
por: Hofmann, Markus
Publicado: (2005)
por: Hofmann, Markus
Publicado: (2005)
Building virtual communities learning and change in cyberspace /
Publicado: (2002)
Publicado: (2002)
Security configuration in a TCP/IP Sysplex environment
Publicado: (2003)
Publicado: (2003)
Security log management identifying patterns in the chaos /
por: Babbin, Jacob
Publicado: (2006)
por: Babbin, Jacob
Publicado: (2006)
How to cheat at managing information security
por: Osborne, Mark
Publicado: (2006)
por: Osborne, Mark
Publicado: (2006)
Building a virtual private network
por: Gupta, Meeta
Publicado: (2003)
por: Gupta, Meeta
Publicado: (2003)
Selected papers from the 4th international network conference 2004 Plymouth UK
Publicado: (2004)
Publicado: (2004)
Security data visualization graphical techniques for network analysis /
por: Conti, Greg
Publicado: (2007)
por: Conti, Greg
Publicado: (2007)
Managing Cisco network security
Publicado: (2002)
Publicado: (2002)
A technical guide to IPSec virtual private networks
por: Tiller, James S.
Publicado: (2001)
por: Tiller, James S.
Publicado: (2001)
SOA governance the key to successful SOA adoption in your organization /
por: Biske, Todd
Publicado: (2008)
por: Biske, Todd
Publicado: (2008)
Nagios Core administration cookbook develop an integrated monitoring solution for virtually any kind of network /
por: Ryder, Tom
Publicado: (2013)
por: Ryder, Tom
Publicado: (2013)
Role engineering for enterprise security management
por: Coyne, Edward J., PhD
Publicado: (2008)
por: Coyne, Edward J., PhD
Publicado: (2008)
Network know-how an essential guide for the accidental admin /
por: Ross, John, 1947-
Publicado: (2009)
por: Ross, John, 1947-
Publicado: (2009)
Integrating netware into the enterprise network /
por: Ziegler, Kurt
Publicado: (1994)
por: Ziegler, Kurt
Publicado: (1994)
Telecommunication Economics Selected Results of the COST Action ISO605 Econ@Tel /
Publicado: (2012)
Publicado: (2012)
Nokia Network security solutions handbook /
por: Maxwell, Douglas D.
Publicado: (2002)
por: Maxwell, Douglas D.
Publicado: (2002)
Web 2.0 & Semantic Web
por: Devedi, Vladan
Publicado: (2009)
por: Devedi, Vladan
Publicado: (2009)
Software defined mobile networks (SDMN) : beyond LTE network architecture /
Publicado: (2015)
Publicado: (2015)
Software defined networks : a comprehensive approach /
por: Goransson, Paul, et al.
Publicado: (2014)
por: Goransson, Paul, et al.
Publicado: (2014)
NGN architectures, protocols and services /
por: Janevski, Toni
Publicado: (2014)
por: Janevski, Toni
Publicado: (2014)
Integrated security systems design concepts, specifications, and implementation /
por: Norman, Thomas L.
Publicado: (2007)
por: Norman, Thomas L.
Publicado: (2007)
Introduction to network security
por: Krawetz, Neal
Publicado: (2007)
por: Krawetz, Neal
Publicado: (2007)
Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
por: Cardwell, Kevin
Publicado: (2014)
por: Cardwell, Kevin
Publicado: (2014)
Data storage networking : real world skills for the comptia storage+TM certification /
por: Minx
Publicado: (2014)
por: Minx
Publicado: (2014)
Publish/subscribe systems design and principles /
por: Tarkoma, Sasu
Publicado: (2012)
por: Tarkoma, Sasu
Publicado: (2012)
Implementing NAP and NAC security technologies the complete guide to network access control /
por: Hoffman, Daniel (Daniel V.), 1972-
Publicado: (2008)
por: Hoffman, Daniel (Daniel V.), 1972-
Publicado: (2008)
Learning Nagios 4 : learn how to set up Nagios 4 in order to monitor your systems efficiently /
por: Kocjan, Wojciech
Publicado: (2014)
por: Kocjan, Wojciech
Publicado: (2014)
Installation and maintenance of SDH/SONET, ATM, xDSL, and synchronization networks
Publicado: (2003)
Publicado: (2003)
Cisco security specialist's guide to PIX Firewall
por: Osipov, Vitaly
Publicado: (2002)
por: Osipov, Vitaly
Publicado: (2002)
Cisco security
por: Bhatnagar, Kartik
Publicado: (2002)
por: Bhatnagar, Kartik
Publicado: (2002)
Network security /
por: Perez, Andre
Publicado: (2014)
por: Perez, Andre
Publicado: (2014)
Wireshark essentials : get up and running with Wireshark to analyze network packets and protocols effectively /
por: Baxter, James H.
Publicado: (2014)
por: Baxter, James H.
Publicado: (2014)
The International Handbook of Virtual Learning Environments
por: Weiss, Joel
Publicado: (2006)
por: Weiss, Joel
Publicado: (2006)
Ejemplares similares
-
Information security governance simplified from the boardroom to the keyboard /
por: Fitzgerald, Todd
Publicado: (2012) -
Realizing the information future the Internet and beyond /
Publicado: (1994) -
Aspects of network and information security
Publicado: (2008) -
Proceedings of the 2009 International Conference on Computer and Network Technology, Chennai, India, 24-26 July 2009
Publicado: (2010) -
Virtual private networking a construction, operation and utilization guide /
por: Held, Gilbert, 1943-
Publicado: (2004)