Mobile access safety beyond BYOD /
        Gardado en:
      
    
          | Autor Principal: | Assing, Dominique | 
|---|---|
| Autor Corporativo: | ebrary, Inc | 
| Outros autores: | Calé, Stéphane | 
| Formato: | Electrónico eBook | 
| Idioma: | inglés | 
| Publicado: | Hoboken, N.J. :
          ISTE Ltd./John Wiley and Sons Inc.,
    
        2013. | 
| Series: | Networks and telecommunications series | 
| Subjects: | |
| Acceso en liña: | An electronic book accessible through the World Wide Web; click to view | 
| Tags: | Engadir etiqueta 
      Sen Etiquetas, Sexa o primeiro en etiquetar este rexistro!
   | 
Títulos similares
                                                Implementing IBM Tivoli Remote Control across firewalls
                                                                                  
Publicado: (2003)
            
                              
                Publicado: (2003)
                                                Beyond cybersecurity : protecting your digital business /
                                                  
por: Kaplan, James M.
Publicado: (2015)
            
                              
                por: Kaplan, James M.
Publicado: (2015)
                                                Implementing NAP and NAC security technologies the complete guide to network access control /
                                                  
por: Hoffman, Daniel (Daniel V.), 1972-
Publicado: (2008)
            
                              
                por: Hoffman, Daniel (Daniel V.), 1972-
Publicado: (2008)
                                                Building DMZs for Enterprise networks
                                                                                  
Publicado: (2003)
            
                Publicado: (2003)
                                                Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
                                                  
por: Cardwell, Kevin
Publicado: (2014)
            
                              
                por: Cardwell, Kevin
Publicado: (2014)
                                                Microsoft DirectAccess best practices and troubleshooting /
                                                  
por: Krause, Jordan
Publicado: (2013)
            
                              
                por: Krause, Jordan
Publicado: (2013)
                                                Identity and access management solutions using WebSphere Portal V5.1, Tivoli Identity Manager V4.5.1, and Tivoli Access Manager V5.1 /
                                                                                  
Publicado: (2005)
            
                              
                Publicado: (2005)
                                                Integrated security systems design concepts, specifications, and implementation /
                                                  
por: Norman, Thomas L.
Publicado: (2007)
            
                por: Norman, Thomas L.
Publicado: (2007)
                                                Citrix XenDesktop 5.6 cookbook implement a fully featured XenDesktop 5.6 architecture in a rich and powerful VDI experience configuration /
                                                  
por: Silvestri, Gaspare A.
Publicado: (2013)
            
                              
                por: Silvestri, Gaspare A.
Publicado: (2013)
                                                Getting started with Citrix XenApp 6 design and implement Citrix farms based on XenApp 6 /
                                                  
por: Musumeci, Guillermo
Publicado: (2011)
            
                              
                por: Musumeci, Guillermo
Publicado: (2011)
                                                Getting started with Citrix® Provisioning services 7.0 /
                                                  
por: Udayakumar, Puthiyavan
Publicado: (2014)
            
                              
                por: Udayakumar, Puthiyavan
Publicado: (2014)
                                                Getting started with XenDesktop 7.x : deliver desktops and applications to your end users, anywhere, anytime, with XenDesktop 7.x /
                                                  
por: Ellrod, Craig Thomas
Publicado: (2014)
            
                por: Ellrod, Craig Thomas
Publicado: (2014)
                                                Instant Spring Security starter learn the fundamentals of web authentication and authorization using Spring Security /
                                                  
por: Jagielski, Piotr
Publicado: (2013)
            
                              
                por: Jagielski, Piotr
Publicado: (2013)
                                                Network and security issues for internet mobile entertainment
                                                                                  
Publicado: (2004)
            
                              
                Publicado: (2004)
                                                Multiple access channels theory and practice /
                                                                                  
Publicado: (2007)
            
                              
                Publicado: (2007)
                                                Intrusion prevention and active response deploying network and host IPS /
                                                  
por: Rash, Michael
Publicado: (2005)
            
                por: Rash, Michael
Publicado: (2005)
                                                Enterprise business portals II with IBM tivoli access manager
                                                  
por: Bücker, Axel
Publicado: (2003)
            
                              
                por: Bücker, Axel
Publicado: (2003)
                                                Aspects of network and information security
                                                                                  
Publicado: (2008)
            
                              
                Publicado: (2008)
                                                SSL and TLS theory and practice /
                                                  
por: Oppliger, Rolf
Publicado: (2009)
            
                              
                por: Oppliger, Rolf
Publicado: (2009)
                                                Ethereal packet sniffing /
                                                  
por: Orebaugh, Angela
Publicado: (2004)
            
                por: Orebaugh, Angela
Publicado: (2004)
                                                Information assurance dependability and security in networked systems /
                                                                                  
Publicado: (2008)
            
                              
                Publicado: (2008)
                                                Role-based access control
                                                  
por: Ferraiolo, David
Publicado: (2003)
            
                              
                por: Ferraiolo, David
Publicado: (2003)
                                                Role-based access control
                                                  
por: Ferraiolo, David
Publicado: (2007)
            
                              
                por: Ferraiolo, David
Publicado: (2007)
                                                Virtual private networking a construction, operation and utilization guide /
                                                  
por: Held, Gilbert, 1943-
Publicado: (2004)
            
                por: Held, Gilbert, 1943-
Publicado: (2004)
                                                Nessus network auditing
                                                  
por: Beale, Jay
Publicado: (2004)
            
                              
                por: Beale, Jay
Publicado: (2004)
                                                Cisco security specialist's guide to PIX Firewall
                                                  
por: Osipov, Vitaly
Publicado: (2002)
            
                              
                por: Osipov, Vitaly
Publicado: (2002)
                                                Nokia Network security solutions handbook /
                                                  
por: Maxwell, Douglas D.
Publicado: (2002)
            
                              
                por: Maxwell, Douglas D.
Publicado: (2002)
                                                Unauthorised access physical penetration testing for IT security teams /
                                                  
por: Allsopp, Wil
Publicado: (2009)
            
                por: Allsopp, Wil
Publicado: (2009)
                                                Secure computer and network systems modeling, analysis and design /
                                                  
por: Ye, Nong
Publicado: (2008)
            
                              
                por: Ye, Nong
Publicado: (2008)
                                                Role mining in business taming role-based access control administration /
                                                  
por: Colantonio, Alessandro
Publicado: (2012)
            
                              
                por: Colantonio, Alessandro
Publicado: (2012)
                                                Mastering metasploit : write and implement sophisticated attack vectors in Metasploit using a completely hands-on approach /
                                                  
por: Jaswal, Nipun
Publicado: (2014)
            
                              
                por: Jaswal, Nipun
Publicado: (2014)
                                                Network security foundations
                                                  
por: Strebe, Matthew
Publicado: (2004)
            
                por: Strebe, Matthew
Publicado: (2004)
                                                Snort 2.0 intrusion detection
                                                  
por: Beale, Jay
Publicado: (2003)
            
                              
                por: Beale, Jay
Publicado: (2003)
                                                Security sage's guide to hardening the network infrastructure
                                                  
por: Andrés, Steven
Publicado: (2004)
            
                              
                por: Andrés, Steven
Publicado: (2004)
                                                Silence on the wire a field guide to passive reconnaissance and indirect attacks /
                                                  
por: Zalewski, Michal
Publicado: (2005)
            
                              
                por: Zalewski, Michal
Publicado: (2005)
                                                Network security evaluation using the NSA IEM /
                                                  
por: Fuller, Ed
Publicado: (2005)
            
                por: Fuller, Ed
Publicado: (2005)
                                                How to cheat at Configuring ISA Server 2004
                                                  
por: Shinder, Dr. Thomas W.
Publicado: (2004)
            
                              
                por: Shinder, Dr. Thomas W.
Publicado: (2004)
                                                Security risk management building an information security risk management program from the ground up /
                                                  
por: Wheeler, Evan
Publicado: (2011)
            
                              
                por: Wheeler, Evan
Publicado: (2011)
                                                Computer and information security handbook
                                                                                  
Publicado: (2009)
            
                              
                Publicado: (2009)
                                                Security and privacy in the digital era.
                                                  
por: Guerrier, Claudine
Publicado: (2016)
            
                        por: Guerrier, Claudine
Publicado: (2016)
Títulos similares
- 
        Implementing IBM Tivoli Remote Control across firewalls
    
 Publicado: (2003)
- 
        Beyond cybersecurity : protecting your digital business /
    
 por: Kaplan, James M.
 Publicado: (2015)
- 
        Implementing NAP and NAC security technologies the complete guide to network access control /
    
 por: Hoffman, Daniel (Daniel V.), 1972-
 Publicado: (2008)
- 
        Building DMZs for Enterprise networks
    
 Publicado: (2003)
- 
        Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /
    
 por: Cardwell, Kevin
 Publicado: (2014)