Flylib.com
PartV.Protecting Hosts
Previous page
Table of content
Next page
Chapter 12
Server and Client Hardening
Previous page
Table of content
Next page
Protect Your Windows Network: From Perimeter to Data
ISBN: 0321336437
EAN: 2147483647
Year: 2006
Pages: 219
Authors:
Jesper M. Johansson
,
Steve Riley
BUY ON AMAZON
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Team change
Organizational change
Leading change
Mergers and acquisitions
IT-based process change
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Case Studies
Service descriptions (with WSDL)
Service activity
Atomic transactions
Introduction to service-oriented design
Junos Cookbook (Cookbooks (OReilly))
Checking NTP Status
Using the Management Interface
IS-IS
Prepending AS Numbers to the AS Path
Verifying Packet Labels
Lean Six Sigma for Service : How to Use Lean Speed and Six Sigma Quality to Improve Services and Transactions
The Value in Conquering Complexity
Phase 3 Mobilization
Phase 4 Performance and Control
Service Process Challenges
First Wave Service Projects
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Events in Visual Studio Tools for Office
Working with the Application Object
Other Events
Binding-Related Extensions to Host Items and Host Controls
A Handy Client-Side ServerDocument Utility
Comparing, Designing, and Deploying VPNs
Summary
Advantages and Disadvantages of MPLS Layer 3 VPNs
IPsec: A Security Architecture for IP
Designing and Building SSL Remote Access VPNs (WebVPN)
Understanding the Operation of SSL Remote Access VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies