Flylib.com
Operating Systems
↵
Unix
Beginning Cryptography with Java
The JCA and the JCE
Object Description in Cryptography Using ASN.1
Key and Certificate Management Using Keystores
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
Inside Network Security Assessment: Guarding Your IT Infrastructure
Network Vulnerability Assessment
The Role Authentication, Authorization, and Accountability Play in a Secure Organization
Encryption
Defining the Scope of the Assessment
Reducing the Risk of an Attack
Software Configuration Management
Project Management in a CM Environment
Appendix A Project Plan
Appendix L Software Requirements Changes
Appendix T Software Configuration Management Plan (SCMP)
Appendix W Physical Configuration Audit (PCA) Checklist
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Analysis and Design
Some Final Thoughts…
Appendix B Testing Survey
Appendix F Process Diagrams
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Loading Image Files Through the Network
Setting the System Prompt
Traffic Shaping
Dial-on-Demand Routing
Tunnels
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Summary
MGCP
Summary
Summary
VPN Monitoring
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies