Home | Amazing | Today | Tags | Publishers | Years | Search 
Security Log Management: Identifying Patterns in the Chaos
Security Log Management: Identifying Patterns in the Chaos
Logs, logs, logs. Ever since I started taking my first steps in the world of security,
it has been clear that “the log” plays a crucial—and sometimes undervalued—
role in the security management of any IT infrastructure.This fact
alone explains the plethora of tools, applications, and solutions whose only
...
RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
I was sitting at my desk when my phone rang. I answered the phone and it was a
large pharmaceutical company who was interested in consulting services.They
started off the conversation stating that they had some problems and thought that
my company might be able to help.They had noticed a trend with one of their foreign...
Google Talking
Google Talking
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
How to Cheat at Configuring ISA Server 2004
How to Cheat at Configuring ISA Server 2004
If deploying and managing ISA Server 2004 is just one of a hundred responsibilities you have as a System Administrator, How to Cheat at Configuring ISA Server 2004 is the perfect book for you. This is a concise, accurate, enterprise tested method for the successful deployment of ISA Server. Written by ISA Server guru and Microsoft Most...
Active Directory Infrastructure: How to Cheat at Designing a Windows Server 2003
Active Directory Infrastructure: How to Cheat at Designing a Windows Server 2003
Before the design of any system implementation may commence, first one must assess the
environment into which that system is to be deployed.This argument holds true especially for
Active Directory (AD). Active Directory has the potential to affect every facet of your IT
infrastructure and every team involved with IT, even in the
...
Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration
Scripting VMware: Power Tools for Automating Virtual Infrastructure Administration
This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.

This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail the different scripting APIs and how they can be leveraged to
...
Practical VoIP Security
Practical VoIP Security
The business of securing our private data is becoming more important and more relevant
each day.The benefits of electronic communication come with proportionate
risks. Critical business systems can be and are compromised regularly, and are used
for illegal purposes.There are many instances of this: Seisint (Lexis-Nexis research),...
Developer's Guide to Web Application Security
Developer's Guide to Web Application Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.

This book defines Web application security, why it should be
...
Video Conferencing Over IP: Configure, Secure, and Troubleshoot
Video Conferencing Over IP: Configure, Secure, and Troubleshoot
Before we help you understand what you need to make video calls, let’s discuss the various
flavors of videoconferencing and outline the topics we focus on in this book so that you
have a clear understanding of the differences among the various videoconferencing solutions.
We divide these videoconferencing types into three
...
Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
Result Page: Previous 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy