configuration auditing
1Hack Attacks Testing. How to Conduct Your Own Security Audit , John Chirillo
Learn how to conduct thorough security examinations via illustrations and virtual simulations A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the… 3251.98 руб электронная книга2IP Address Management Principles and Practice , Timothy Rooney
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated… 10380.3 руб электронная книга3Group Policy. Fundamentals, Security, and the Managed Desktop , Jeremy Moskowitz
The Ultimate Book on Group Policy Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book… 3251.32 руб электронная книга