Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.

Kirjailija

Tim Speed

Kirjat ja teokset yhdessä paikassa: 5 kirjaa, julkaisuja vuosilta 2001-2013, suosituimpien joukossa The Personal Internet Security Guidebook. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

5 kirjaa

Kirjojen julkaisuhaarukka 2001-2013.

The Personal Internet Security Guidebook

The Personal Internet Security Guidebook

Tim Speed; Juanita Ellis; Steffano Korper

Academic Press Inc
2001
nidottu
The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network. This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile Security: How to Secure, Privatize, and Recover Your Devices

Tim Speed; Darla Nykamp; Mari Heiser; Joseph Anderson; Jaya Nampalli

Packt Publishing Limited
2013
nidottu
Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.
SSL VPN : Understanding, evaluating and planning secure, web-based remote access
The book blends technically rigorous descriptions with a friendly approach based on practical examples and scenarios. The authors write in clear, informal language and make extensive use of diagrams and images. The book begins with an overview of SSL VPN?s purpose, and the technical and business trends that are making it popular today. It then looks at how SSL VPNs work and how they fit into existing network plans. The effect of SSL VPN on the wider business environment is then considered, before looking at how SSL VPN technology is likely to develop in the future. This book aimed at IT network professionals and managers who are currently evaluating SSL VPN technologies. It requires a broad understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations
Internet Security

Internet Security

Tim Speed; Juanita Ellis

Digital Press
2003
nidottu
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work. New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
Enterprise Directory and Security Implementation Guide

Enterprise Directory and Security Implementation Guide

Charles Carrington; Tim Speed; Juanita Ellis; Steffano Korper

Academic Press Inc
2002
nidottu
The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance. This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies.