|
|
The Mezonic Agenda: Hacking the Presidency"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will... | | | | Stealing the Network: How to Own the BoxStealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real.While none of these specific events have happened, there is no reason why they could not.You could argue it provides a roadmap for criminal hackers, but I say it does something... |
|
Building DMZs for Enterprise NetworksDuring the course of the last few years, it has become increasingly evident that there is a pronounced need for protection of internal networks from the outside world. As machine technologies have improved and extensive shifts in the functions that a user can accomplish through more user-friendly interfaces have occurred, many more... | | The Best Damn Firewall Book PeriodThis book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more.
In the beginning, there were router access lists…
... | | The Best Damn Cisco Internetworking Book PeriodCisco is almost synonymous with networking.There is almost no area of networking in which Cisco is not a key player, or is not making inroads.You name it Cisco makes it—routers, switches, firewalls, management software, and so on. It can be quite an undertaking to locate and acquire all of the information needed to configure,... |
|
|
Check Point NG VPN-1/Firewall-1: Advanced Configuration and TroubleshootingSecurity of corporate networks has become big business. Many companies are willing to provide hardware, software, consulting, design, and implementation services.The product space is vast, offering many different levels of products that claim to provide all manner of solutions.The problem with the current state of the security space... | | ASP Programming for the Absolute BeginnerWelcome to ASP Programming for the Absolute Beginner. By developing an interest in Active Server Pages (ASP), you stand at the threshold of a very exciting programming adventure. When first introduced, ASP offered the promise of an easy, powerful method of breaking through the functional shackles of the Common Gateway Interface... | | Tune Up Your PC In a Weekend, 2nd EditionMost of the problems that people have with their PCs are software-based and easily fixable,at little or no expense--if you know how! This book walks the Reader step-by-step through the same troubleshooting and correction processes that experts use when people pay them $50 per hour or more to work on the PCs. This book thoroughly covers the... |
|
Result Page: Previous 3000 3001 3002 3003 3004 3005 3006 3007 3008 3009 3010 3011 3012 3013 3014 3015 3016 3017 3018 3019 3020 Next |