Showing 181 - 200 results of 233 for search '"Security"', query time: 0.02s Refine Results
  1. 181
    by Thorsten Holz
    Published
    Subjects: ... that unveils the world of honeypots in front of the readers eyes. --Lenny Zeltser, Information Security...
    TEXT
  2. 182
    by Zvi Bodie
    Published
    Subjects: ...With the pension crisis in England getting worse by the year, more and more people want to secure...
    TEXT
  3. 183
    by Ian Sykes
    Published
    Subjects: ...With the pension crisis in England getting worse by the year, more and more people want to secure...
    TEXT
  4. 184
    by Jeffrey R. Shapiro
    Published
    Subjects: ... to deliver increased scalability, availability, and security to enterprise data and analytical applications...
    TEXT
  5. 185
    by Jazib Frahim
    Published
    Subjects: ...Identify, mitigate, and respond to network attacks * Understand the evolution of security...
    TEXT
  6. 186
    by Dinesh C. Verma
    Published
    Subjects: ... to the network at a single console, it promises easy management of critical network elements such as security...
    TEXT
  7. 187
    by Roberta Bragg
    Published
    Subjects: ...There is no single, credible reference available for Windows 2000 security issues. Existing...
    TEXT
  8. 188
    by Greg Hoglund
    Published
    Subjects: ... to computer security problems. Increasingly, companies large a...
    TEXT
  9. 189
    by Gary McGraw
    Published
    Subjects: ... to computer security problems. Increasingly, companies large a...
    TEXT
  10. 190
    by Randall K. Nichols
    Published
    Subjects: ...This comprehensive guide catalogues and explains the full range of the security challenges involved...
    TEXT
  11. 191
    by Panos C. Lekkas
    Published
    Subjects: ...This comprehensive guide catalogues and explains the full range of the security challenges involved...
    TEXT
  12. 192
    by Dusan Petkovic
    Published
    Subjects: ..., installation, data management, security, data warehousing, and more. Builds core competency in creating...
    TEXT
  13. 193
    by Rahmat Rafiudin
    Published
    Subjects: ...Keunggulan OpenBSD di antara sistem-sistem UNIX lainnya terletak pada security. Hal ini sejalan...
    TEXT
  14. 194
    by Peter Rybaczyk
    Published
    Subjects: .... It addresses core networking issues, including security, cus...
    TEXT
  15. 195
    by Greg Abelar
    Published
    Subjects: ...Description Protect critical data and maintain uptime with Cisco ASDM and Cisco Security Agent...
    TEXT
  16. 196
    by Peter Rybaczyk
    Published
    Subjects: .... It addresses core networking issues, including security, cus...
    TEXT
  17. 197
    by Abraham Silberschatz
    Published
    Subjects: ..., network structures, and security....
    TEXT
  18. 198
    by Peter Baer galvin
    Published
    Subjects: ..., network structures, and security....
    TEXT
  19. 199
    by Alan Calder
    Published
    Subjects: ...ISO 27001:2005 replaced the information security standard BS7799-2 from October 2005. Read...
    TEXT
  20. 200
    by Jack Febrian
    Published
    Subjects: ... teknologi informasi dan komunikasi. Menyajikan berbagai pengertian tentang: PC, Notebook, Security, Sistem...
    TEXT