|
Showing 1 - 6 of
6 matches in All Departments
Learn how to keep yourself safe online with easy- to- follow
examples and real- life scenarios. Written by developers at IBM,
this guide should be the only resource you need to keep your
personal information private. Mobile security is one of the most
talked about areas in I.T. today with data being stolen from
smartphones and tablets around the world. Make sure you, and your
family, are protected when they go online.
The book blends technically rigorous descriptions with a friendly
approach based on practical examples and scenarios. The authors
write in clear, informal language and make extensive use of
diagrams and images. The book begins with an overview of SSL VPN?s
purpose, and the technical and business trends that are making it
popular today. It then looks at how SSL VPNs work and how they fit
into existing network plans. The effect of SSL VPN on the wider
business environment is then considered, before looking at how SSL
VPN technology is likely to develop in the future. This book aimed
at IT network professionals and managers who are currently
evaluating SSL VPN technologies. It requires a broad understanding
of networking concepts, but does not require specific and detailed
technical knowledge of protocols or vendor implementations
Internet Security incorporates not only the technology needed to
support a solid security strategy but also those policies and
processes that must be incorporated in order for that strategy to
work.
New methods of breaking into corporate networks are resulting in
major losses. This book provides the latest information on how to
guard against attacks and informs the IT manager of the products
that can detect and prevent break-ins. Crucial concepts such as
authentication and encryption are explained, enabling the reader to
understand when and where these technologies will be useful. Due to
the authors' experiences in helping corporations develop secure
networks, they are able to include the newest methods for
protecting corporate data.
.Shield data from both the internal and external intruder
.Discover products that can detect and prevent these break-ins
.Protect against major losses with the latest incident handling
procedures for detecting and recovering data from new viruses
.Get details of a full security business review from performing the
security risk analysis to justifying security expenditures based on
your company's business needs"
The Internet is connecting enterprises into a global economy.
Companies are exposing their directories, or a part of their
directories, to customers, business partners, the Internet as a
whole, and to potential "hackers." If the directory structure is
compromised, then the whole enterprise can be at risk. Security of
this information is of utmost importance.
This book provides examples and implementation guidelines on
building secure and structured enterprise directories. The authors
have worked with corporations around the world to help them design
and manage enterprise directories that operate efficiently and
guard against outside intrusion. These experts provide the reader
with "best practices" on directory architecture, implementation,
and enterprise security strategies.
The Internet Security Guidebook provides a complete analysis of an
enterprise's Internet security. Strategies, steps, and procedures
for conducting business securely on the Internet are discussed and
reviewed. Very few organizations take the needed precautions to
protect their Internet enterprise. Protection is not simply a
firewall or technology; it is a strategy that encompasses risk,
trust, business goals, security processes, and technology. The
holistic approach offered in this book evaluates security needs in
relation to business goals and the current attacks on the global
Internet. The goal of The Internet Security Guidebook is to protect
the business-computing environment by keeping our online
enterprises functioning correctly and securely.
Unlike other books available, this book contains a complete guide
to Internet security that is accessible to both novices and
computer professionals. The specific steps discussed and
illustrated show the reader how to implement security from the
individual process to the complete corporate enterprise. The reader
will also learn about resources that can help such as the Computer
Emergency Response Team (CERT), the Federal Bureau of Investigation
(FBI), and even their own software vendors.
The Personal Internet Security Guidebook is a complete guide to
protecting your computer(s) on the Internet. The newest attack
point for hackers is home computers on DSL and/or cable modems.
This book will show you how to set up a home network and protect it
from the "bad dudes." Also covered in this book is how to protect
your computer on the road. Many hotels are now offering high-speed
Internet access and this book will show you how to keep your
computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on
the Internet. Following the success of The Internet Security
Guidebook, the authors have used their expertise to create a book
specifically addressing home computers and traveling notebooks.
Included in this book is a comprehensive list of vendors and
services. Included are these key elements: protecting your PC on
the Internet, home firewall software, how to set up a home network,
protecting your PC on the road, and protecting your PC via DSL
and/or cable modem.
A comprehensive list of vendors and services that you can download
or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems
|
You may like...
Cold Pursuit
Liam Neeson, Laura Dern
Blu-ray disc
R39
Discovery Miles 390
Morgan
Kate Mara, Jennifer Jason Leigh, …
Blu-ray disc
(1)
R67
Discovery Miles 670
|