Skip to main content

Books in Computer security

391-400 of 403 results in All results

DBAs Guide to Databases Under Linux

  • 1st Edition
  • April 26, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 0 2 9 - 1
In an effort to increase its marketshare and threat to Windows NT, Oracle8 was ported to Linux in late 1998, opening the popular database to an additional 10 million Linux users worldwide. The availability of Oracle8 enables current Linux users to deploy enterprise-class applications at low cost and provides an alternative to Microsoft Windows NT. This book covers that marriage of the most popular database and the fastest growing operating system.

Windows 2000 Configuration Wizards

  • 1st Edition
  • March 20, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 4 3 8 1 - 9
Developers are used to working with Wizards, component-like products that allow them to create certain elements - like dialog buttons - quickly and easily while they are coding applications. With the launch of Windows 2000, Microsoft has announced a new set of Wizards that will help administrators and users configure and set up Windows 2000 Professional (the Windows NT 4 Workstation successor) and Windows 2000 Server (the Windows NT 4 Server successor). Windows 2000 Setup and Configuration Wizards covers all the available Wizards, with an emphasis on those new to Windows 2000. Each Wizard is broken down by dialog box, with explanations of all options and required elements so administrators will know what to be prepared with.In addition, coverage of new services that will speed configuration and set up (like the Windows Installer) will be covered.

Windows 2000 Server System Administration Handbook

  • 1st Edition
  • February 16, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 7 5 - 3
Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring, and managing Microsoft products will be highly motivated to migrate to this new technology, based on its promise of reducing administrative overhead.Windows 2000 Server System Administration Handbook will help NT4 professionals to administer and support the Windows 2000 Server operating system. NT administrators will be able to differentiate the features and technology changes from Windows NT 4.0 to Windows 2000. In the handbook, readers will find a complete overview of the product, catered to their needs.

Managing Windows 2000 Network Services

  • 1st Edition
  • February 10, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 5 7 6 - 0
Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring and managing Microsoft products will be highly motivated to migrate to this new technology, based on its promise of reducing administrative overhead.Microsoft Windows 2000 Server (the predecessor to Windows NT 4 Server) integrates network services for companies and administrators to set up and manage networks, remote access and extranets, as well as to manage other communications. Managing Windows 2000 Network Services will be the first book to focus exclusively on networking and integrated voice, video, and data on networks. Readers will learn how to deploy and integrate all Windows 2000 networking technologies within an enterprise network.

IP Addressing and Subnetting INC IPV6

  • 1st Edition
  • January 28, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 3 5 2 2 - 7
Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. They allow for the precise routing of data across very complex worldwide internetworks. The rules for their format and use are governed by the Internet Engineering Task Force (IETF) of the The Internet SOCiety (ISOC). In response to the exponential increase in demand for new IP addresses, the IETF has finalized its revision on IP addressing as IP Version 6, also know as IPng (ng = Next Generation). Key hardware vendors such as Cisco and major Internet Service Providers such as America Online have already announced plans to migrate to IP Version 6.IP address allocation within an organization requires a lot of long-term planning. This timely publication addresses the administrator and engineer's need to know how IP 6 impacts their enterprise networks.

Ultimate Computer Security Survey

  • 1st Edition
  • August 3, 1995
  • James L Schaub + 1 more
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 6 5 0 - 0
This valuable tool for the security manager will assist in tailoring surveys specifically for computer security. The Ultimate Computer Security Survey will allow security managers to take one of the most time-consuming and difficult areas of security -vulnerability assessment- and make it manageable. This bank of questions provides all the information needed to design numerous surveys for computer and data security. It takes into account that every facility and location, as well as the corporate complexion of every business, is distinctly different. The questions in this survery are all on a disk, which accompanies the book eliminating the need to retype anything, and saving valuable time.

Anti-Virus Tools and Techniques for Computer

  • 1st Edition
  • January 1, 1995
  • W. Timothy Polk + 3 more
  • English
  • Hardback
    9 7 8 - 0 - 8 1 5 5 - 1 3 6 4 - 3
  • eBook
    9 7 8 - 1 - 4 3 7 7 - 2 8 2 1 - 7
Anti-Virus Tools & Techniques for Computer

Media Equities

  • 1st Edition
  • January 1, 1995
  • Christopher Gasson
  • English
  • eBook
    9 7 8 - 0 - 8 5 7 0 9 - 9 9 8 - 3
This book provides an invaluable insight into one of the most influential global industries. It covers: publishing; broadcasting; newspapers and journals; advertising and public relations. Each section provides the reader with an analysis of potential costs and incomes, together with opportunities and associated risks. This provides a highly structured and informative view of the media industry. The final section provides an overview of the current developments and possibilities for the future.

Computer Risk Manager

  • 1st Edition
  • October 31, 1992
  • K.R. Pursall
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 6 7 8 - 4
Please note this is a Short Discount publication.A comprehensive guide to EDP contingency planning and disaster recovery.Thoroughly revised and updated from the last edition [published 1989], this best selling management guide has been re–written to reflect the latest thinking on contingency planning.The new third edition follows the same step–by–step practical guidance as the last edition – presenting an immediate source of reference for anyone wanting to develop their own contingency plan BEFORE a systems disaster. As well as a useful check for those assessing the security of their present systems.Who should read it:★ IT Managers★ Operations Managers★ Computer Security Managers★ MIS Managers★ Technical Support Managers★ Computer Manufacturers and Suppliers★ Computer Auditors★ General Managers

Data Protection and Security for Personal Computers

  • 1st Edition
  • October 30, 1992
  • R. Schifreen
  • English
  • eBook
    9 7 8 - 1 - 4 8 3 2 - 9 4 7 4 - 2
Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization.Practical, comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks.UNIQUE FEATURES INCLUDE:– Totally PC and LAN specific– Practical tips and guidance– Comprehensive coverage of the topic– Unique action sheets for immediate implementation– Step–by– step coverage, easy to read, with limited technical jargonWHO SHOULD READ THIS GUIDE:– PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data.– Senior managers who wish to ensure that data on their employees PC's is safe at all times.– Managers with little computing or security experience who wish to implement a security policy throughout an organization.Please note this is a Short Discount publication.