Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network, tells the fictional ……続きを見る
In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate stra……続きを見る
Throughout the book, we will follow a fictional company, the case study will help you in implementing FIM 2010 R2. All the examples in the book will relate to this fictive company and you will be ta……続きを見る
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable
Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s ……続きを見る