Internet Security discusses not only the technology needed to support a solid security strategy, but also those policies and processes that must be incorporated in order for that strategy to work.
New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to guard against attacks and informs the IT manager of the products that can detect and prevent break-ins. Crucial concepts such as authentication and encryption are explained, enabling the reader to understand when and where these technologies will be useful. Due to the authors’ experiences in helping corporations develop secure networks, they are able to include the newest methods for protecting corporate data.
- Shield data from both the internal and external intruder
- Discover products that can detect and prevent these break-ins
- Protect against major losses with the latest incident handling procedures for detecting and recovering data from new viruses
- Get details of a full security business review from performing the security risk analysis to justifying security expenditures based on your company’s business needs.
Managing Enterprise Systems with the Windows Script Host
- Covers common administration tasks for Exchange 5.5, Exchange 2000, Internet Information Server (IIS) 4.0 and 5.0, and Windows NT 4.0, 2000, and XP
- Includes extensive examples using Windows Management Instrumentation (WMI) to provide registry, network/system administrative, and security operations
Space-Time Coding Space–Time Coding provides an introduction to the subject and its application to wireless communication systems. With the integration of internet and multimedia applications in next generation wireless communications, the demand for wide-band high data rate communication services is growing. Space–time coding is based on... Higher-Order Perl: Transforming Programs with Programs "Higher-Order Perl is the most exciting, most clearly-written, most comprehensive, and most forward-looking programming book I've read in at least ten years. It's your map to the future of programming in any language."
—Sean M. Burke, Leading Programmer, Comprehensive Perl Archive Network (CPAN)
Most Perl programmers were...
Ip Multicasting: Concepts and Applications
This book is an introduction to IP multicast concepts and features and is intended for users with varying degrees of experience with the IP multicast technologies, decisionmakers wrestling with the problems of corporate communication, system administrators and operators managing their own workstations, and programmers. Finally, this book is...