![]() |
![]() |
Your cart is empty |
||
Showing 1 - 6 of 6 matches in All Departments
Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.
The book blends technically rigorous descriptions with a friendly approach based on practical examples and scenarios. The authors write in clear, informal language and make extensive use of diagrams and images. The book begins with an overview of SSL VPN?s purpose, and the technical and business trends that are making it popular today. It then looks at how SSL VPNs work and how they fit into existing network plans. The effect of SSL VPN on the wider business environment is then considered, before looking at how SSL VPN technology is likely to develop in the future. This book aimed at IT network professionals and managers who are currently evaluating SSL VPN technologies. It requires a broad understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations
Internet Security incorporates not only the technology needed to
support a solid security strategy but also those policies and
processes that must be incorporated in order for that strategy to
work.
The Internet is connecting enterprises into a global economy.
Companies are exposing their directories, or a part of their
directories, to customers, business partners, the Internet as a
whole, and to potential "hackers." If the directory structure is
compromised, then the whole enterprise can be at risk. Security of
this information is of utmost importance.
The Internet Security Guidebook provides a complete analysis of an
enterprise's Internet security. Strategies, steps, and procedures
for conducting business securely on the Internet are discussed and
reviewed. Very few organizations take the needed precautions to
protect their Internet enterprise. Protection is not simply a
firewall or technology; it is a strategy that encompasses risk,
trust, business goals, security processes, and technology. The
holistic approach offered in this book evaluates security needs in
relation to business goals and the current attacks on the global
Internet. The goal of The Internet Security Guidebook is to protect
the business-computing environment by keeping our online
enterprises functioning correctly and securely.
The Personal Internet Security Guidebook is a complete guide to
protecting your computer(s) on the Internet. The newest attack
point for hackers is home computers on DSL and/or cable modems.
This book will show you how to set up a home network and protect it
from the "bad dudes." Also covered in this book is how to protect
your computer on the road. Many hotels are now offering high-speed
Internet access and this book will show you how to keep your
computer safe in the hotel room as well as on the hotel network.
|
![]() ![]() You may like...
Rogue One: A Star Wars Story - Blu-Ray…
Felicity Jones, Diego Luna, …
Blu-ray disc
R417
Discovery Miles 4 170
|