Télécharger le livre :  Securing IM and P2P Applications for the Enterprise
This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are...

Editeur : Syngress
Parution : 2005-12-12
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Adversary Characterization
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism.The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive...

Editeur : Syngress
Parution : 2004-07-09
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande