Xem 1-20 trên 25 kết quả Security architect
  • If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever.

    pdf262p stingdau_123 19-01-2013 15 2   Download

  • This book was written to give the reader a well-rounded understanding of wireless network security. It looks at wireless from multiple perspectives, ranging from auditor, to security architect, to hacker. This wide scope benefits anyone who has to administer, secure, hack, or participate on a wireless network. Going through this book, the reader will see that it tackles the risk of wireless from many angles. It goes from a policy level to mitigate certain risks that wireless brings. It talks about the most cost-effective solutions to deploy wireless across a large enterprise.

    pdf353p daokim 04-08-2009 222 132   Download

  • A comprehensive yet comprehensible and witty guide to the latest advances in computer network security protocols. The author team includes Charlie Kaufman, currently chief security architect for Lotus Notes, and formerly Network Security Architect at Digital Equipment Corporation;

    pdf3673p muathu_102 28-01-2013 167 46   Download

  • Chris Butler (CISSP, JNCIS-FWV, JNCIA-SSL, CCSE, IAM/IEM) is a Senior Solutions Architect with Intellitactics. Chris has more than a dozen years of experience in the networking and security fields. He is a veteran of the United States Navy, where he worked in the cryptography field. Chris has designed, implemented, and supported some of the largest networks in the country for large insurance companies, investment firms, software companies, service providers, and pharmaceutical companies. He has also provided network and security consulting services for numerous...

    pdf243p vusuakhonghat 28-05-2009 186 90   Download

  • Zend's new PHP 5 Certification Exam represent an excellent tool for professional PHP developers who want to distinguish themselves in their field. php|architect's Zend PHP 5 Certification Study Guide, edited and produced by the publishers of php|architect magazine, provides the most comprehensive and thorough preparation tool for developers who wish to take the exam.

    pdf290p fangfangfang 11-05-2012 156 69   Download

  • Multicast and group security (Artech house computer security series) is a handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks from the leading developer of the standards. It also examines important security issues relating to other group communication technologies. Algorithms and protocols for multi-party secure communication are included.

    pdf330p taurus23 02-08-2012 22 7   Download

  • There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.

    pdf433p ptng13 16-05-2012 33 6   Download

  • With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to write secure and reliable applications is become more and more important every day. Written by Ilia Alshanetsky, one of the foremost experts on PHP security in the world, php|architect's Guide to PHP Security focuses on providing you with all the tools and knowledge you need to both secure your existing applications and writing new systems with security in mind.

    pdf201p trasua_123 14-01-2013 127 5   Download

  • Master SAP NetWeaver Portal with the most comprehensive, step-by-step reference available on the entire portal implementation life cycle. Written by SAP architect Rabi Jay, this book provides everything you need to plan, design, install, configure, and administer SAP NetWeaver Portal, including SAP NetWeaver Application Server Java.

    pdf770p batoan 04-08-2009 188 124   Download

  • This question has been foremost in my mind since the onset of this project, as my goal is to compile and offer the right information for the right audience. While architecting and deploying OpenSSH implementations for Fortune 100 enterprises and home networks alike, I have referred to SSH resources both online and in print, and I came to the conclusion that most information on the topic is scattered, disorganized, or pretty dated. This presents a problem to most overworked system administrators.

    pdf313p huyhoang 05-08-2009 137 57   Download

  • Your role as a Cisco Certified Design Associate is to be a network design consultant. You will act like an architect, building comprehensive designs that solve your customer's internetworking problems and provide the required functionality, performance, and scalability. In the same way that an architect designs a building or house for a client, you will develop blueprints for an overall internetwork design, as well as components plans for various pieces of the internetwork.

    pdf496p maiphuong 10-08-2009 131 44   Download

  • ”Phase is a very small text editor written in PHP. It uses HTML for the interface, and is easily customized. It can access any directory that your platform allows. Phase was designed for localhost access in mind (on your PC running Apache with PHP), and thus it has no security built-in.”

    pdf71p vinhnghi 17-08-2009 93 32   Download

  • This Solution Reference Network Design (SRND) provides design and implementation recommendations fo r deploying security services in the data center. This document discusses security topologies that include both appliance and integrated devices. This publication provides solution guidelines for enterprises implementing Data Centers with Cisco devices.

    pdf128p kieuoanh 11-08-2009 155 28   Download

  • This document describes the Cisco technologies, tools, and tested solutions for providing security in the enterprise data center. This document is intended for network design engineers, network architects, and network support engineers who are responsible for planning, designing, implementing, and operating enterprise data center networks.

    pdf300p batoan 11-08-2009 90 18   Download

  • This course is intended for individuals who are responsible for the design and development of Web applications. These individuals typically have three to five years of experience in developing or designing distributed Web applications. Actual job roles and titles will vary throughout the technology industry, and may include, but may not be limited to, Web developers and solutions architects.

    pdf12p thuxuan 08-08-2009 80 13   Download

  • As a network administrator, architect, or security professional, you need to understand the capabilities, limitations, and risks associated with integrating wireless LAN technology into your current infrastructure. This practical guide provides all the information necessary to analyze and deploy wireless networks with confidence. It?s the only source that offers a full spectrum view of 802.11, from the minute details of the specification, to deployment, monitoring, and troubleshooting.

    pdf259p ptng13 06-06-2012 27 10   Download

  • We software architects and developers live in a fascinating time. With the release of the .NET Framework in 2000, Web services technology has swept into our programming toolset and into our collective consciousness. Web services are the killer application for XML. Web services are the “new way” to call distributed objects remotely. Web services will take all of our integration headaches away and allow formerly incompatible systems to communicate again. What Microsoft developer has not recently thought to himself, “should I be building my application with Web services?”...

    pdf271p tailieuvip13 24-07-2012 51 6   Download

  • Our first training course is dedicated exclusively to the certification exam. It covers all the topics that are part of the exam itself in a total of over 18 hours of training spread over three weeks, and will be taught by Ilia Alshanetsky, who is a regular collaborator to php|a and a well-known PHP expert. It’s all available for a very convenient price (particularly if you sign up before July 31st), and we’re even throwing in a special offer that includes a copy of the certification guide, an exam voucher and a full-copy of the Zend Studio IDE....

    pdf71p vinhnghi 17-08-2009 177 111   Download

  • Guy Davies has worked as an IP Architect for Telindus, a network integrator in the UK, for four years. While at Telindus, he has been involved in many projects ranging from the design, implementation and operation of customers’ core IP networks through to migration of ATM networks to an IP and MPLS-based infrastructure, and the design and implementation of large secured wireless networks and consultancy as well as the development of wireless rural broadband access.

    pdf305p daokim 04-08-2009 112 34   Download

  • This publication provides solution guidelines for enterprises implementing Data Centers with Cisco devices. The intended audiences for this design guide include network architects, network managers, and others concerned with the implementation of secure Data Center solutions, including: • Cisco sales and support engineers • Cisco partners • Cisco customers

    pdf130p kieuoanh 11-08-2009 104 32   Download

Đồng bộ tài khoản