![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 5 of 5 matches in All Departments
Internet Security incorporates not only the technology needed to
support a solid security strategy but also those policies and
processes that must be incorporated in order for that strategy to
work.
The Personal Internet Security Guidebook is a complete guide to
protecting your computer(s) on the Internet. The newest attack
point for hackers is home computers on DSL and/or cable modems.
This book will show you how to set up a home network and protect it
from the "bad dudes." Also covered in this book is how to protect
your computer on the road. Many hotels are now offering high-speed
Internet access and this book will show you how to keep your
computer safe in the hotel room as well as on the hotel network.
The Internet is connecting enterprises into a global economy.
Companies are exposing their directories, or a part of their
directories, to customers, business partners, the Internet as a
whole, and to potential "hackers." If the directory structure is
compromised, then the whole enterprise can be at risk. Security of
this information is of utmost importance.
Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.
The book blends technically rigorous descriptions with a friendly approach based on practical examples and scenarios. The authors write in clear, informal language and make extensive use of diagrams and images. The book begins with an overview of SSL VPN?s purpose, and the technical and business trends that are making it popular today. It then looks at how SSL VPNs work and how they fit into existing network plans. The effect of SSL VPN on the wider business environment is then considered, before looking at how SSL VPN technology is likely to develop in the future. This book aimed at IT network professionals and managers who are currently evaluating SSL VPN technologies. It requires a broad understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations
|
You may like...
Digital Video Communications
Martyn J. Riley, Iain E Richardson
Hardcover
R2,334
Discovery Miles 23 340
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek
Hardcover
R1,418
Discovery Miles 14 180
|