0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Internet Security - A Jumpstart for Systems Administrators and IT Managers (Paperback, New): Tim Speed, Juanita Ellis Internet Security - A Jumpstart for Systems Administrators and IT Managers (Paperback, New)
Tim Speed, Juanita Ellis
R2,087 Discovery Miles 20 870 Ships in 10 - 15 working days

Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.
New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors' experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
.Shield data from both the internal and external intruder
.Discover products that can detect and prevent these break-ins
.Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses
.Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company's business needs"

The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback): Tim Speed, Juanita Ellis,... The Personal Internet Security Guidebook - Keeping Hackers and Crackers out of Your Home (Paperback)
Tim Speed, Juanita Ellis, Steffano Korper
R1,966 Discovery Miles 19 660 Ships in 10 - 15 working days

The Personal Internet Security Guidebook is a complete guide to protecting your computer(s) on the Internet. The newest attack point for hackers is home computers on DSL and/or cable modems. This book will show you how to set up a home network and protect it from the "bad dudes." Also covered in this book is how to protect your computer on the road. Many hotels are now offering high-speed Internet access and this book will show you how to keep your computer safe in the hotel room as well as on the hotel network.
This is a how-to guide to keeping your personal computer safe on the Internet. Following the success of The Internet Security Guidebook, the authors have used their expertise to create a book specifically addressing home computers and traveling notebooks. Included in this book is a comprehensive list of vendors and services. Included are these key elements: protecting your PC on the Internet, home firewall software, how to set up a home network, protecting your PC on the road, and protecting your PC via DSL and/or cable modem.
A comprehensive list of vendors and services that you can download or purchase
Key elements such as: protecting your PC on the internet
How to fully utilise home firewall software
How to set-up a home network
Information on protecting you PC on the road
Information on protecting your PC via DSL and cable modems

Enterprise Directory and Security Implementation Guide - Designing and Implementing Directories in Your Organization... Enterprise Directory and Security Implementation Guide - Designing and Implementing Directories in Your Organization (Paperback)
Charles Carrington, Tim Speed, Juanita Ellis, Steffano Korper
R2,074 Discovery Miles 20 740 Ships in 10 - 15 working days

The Internet is connecting enterprises into a global economy. Companies are exposing their directories, or a part of their directories, to customers, business partners, the Internet as a whole, and to potential "hackers." If the directory structure is compromised, then the whole enterprise can be at risk. Security of this information is of utmost importance.
This book provides examples and implementation guidelines on building secure and structured enterprise directories. The authors have worked with corporations around the world to help them design and manage enterprise directories that operate efficiently and guard against outside intrusion. These experts provide the reader with "best practices" on directory architecture, implementation, and enterprise security strategies.

Mobile Security: How to Secure, Privatize, and Recover Your Devices (Paperback, 2nd Revised edition): Tim Speed, Darla Nykamp,... Mobile Security: How to Secure, Privatize, and Recover Your Devices (Paperback, 2nd Revised edition)
Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli
R1,149 Discovery Miles 11 490 Ships in 18 - 22 working days

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.

SSL VPN : Understanding, evaluating and planning secure, web-based remote access (Paperback): Joseph Steinberg, Tim Speed SSL VPN : Understanding, evaluating and planning secure, web-based remote access (Paperback)
Joseph Steinberg, Tim Speed
R1,260 Discovery Miles 12 600 Ships in 18 - 22 working days

The book blends technically rigorous descriptions with a friendly approach based on practical examples and scenarios. The authors write in clear, informal language and make extensive use of diagrams and images. The book begins with an overview of SSL VPN?s purpose, and the technical and business trends that are making it popular today. It then looks at how SSL VPNs work and how they fit into existing network plans. The effect of SSL VPN on the wider business environment is then considered, before looking at how SSL VPN technology is likely to develop in the future. This book aimed at IT network professionals and managers who are currently evaluating SSL VPN technologies. It requires a broad understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Stressproof - The Game Plan
Richard Sutton Paperback R310 R281 Discovery Miles 2 810
Digital Video Communications
Martyn J. Riley, Iain E Richardson Hardcover R2,334 Discovery Miles 23 340
Governing Savages
Andrew Markus Paperback R1,383 Discovery Miles 13 830
Pentel Medium Water Brush
 (2)
R81 Discovery Miles 810
The Shaping of Environmental Policy in…
Joseph Szarka Paperback R836 Discovery Miles 8 360
Christo Wiese - Risiko en Rykdom
T J Strydom Paperback R395 R353 Discovery Miles 3 530
65 Years Of Friendship
George Bizos Paperback  (2)
R349 Discovery Miles 3 490
Self-Helpless - A Cynic's Search for…
Rebecca Davis Paperback  (4)
R290 R263 Discovery Miles 2 630
Sabotage - Eskom Under Siege
Kyle Cowan Paperback  (2)
R340 R314 Discovery Miles 3 140
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek Hardcover R1,418 Discovery Miles 14 180

 

Partners