Ссылка | Дата | Объем в кбайтах | Число страниц | Справка |
Protect: Protect Today, Secure Your Future. |
2009 |
256 |
10 |
Способы и средства защиты от сетевых атак |
Key technologies in a network perimeter intrusion defense strategy |
2009 |
599 |
8 |
|
Network Attack and Defense |
2010 |
750 |
24 |
|
Uniting IAM and data protection for greater security |
2011 |
269 |
10 |
|
How to Prevent Rogue Antivirus Programs in the Enterprise (ESET) |
2010 |
1032 |
4 |
|
Ten Ways to Dodge CyberBullets David Harley |
2010David Harley, |
1182 |
15 |
|
How to Secure a PDF File |
2010 |
1049 |
5 |
|
Executive's Guide to Evaluating, Securing, and Deciding on Microsoft Internet Explorer 8 |
2010 |
289 |
5 |
|
Honeynets: a tool for counterintelligence in online security David Watson, |
2007 |
350 |
5 |
|
INTELLIGENT SELF-DEFENDING SECURE STORAGE |
2009 |
935 |
2 |
|
The Perils of Using the Wrong Approach to USB Flash Drive Security |
January 9, 2008 |
129 |
6 |
|
Integrated Software Enhances Enterprise Security (Intel) |
2008 |
183 |
4 |
|
Detect and Survive By Robert Schifreen, UK-based IT Security Consultant and Author of Defeating the Hacker |
2010 |
312 |
8 |
|
Protecting Data From the Cyber Theft Pandemic |
April, 2009 |
670 |
6 |
|
Maintaining trust: protecting your Web site users from malware. |
November 2009IBM |
258 |
12 |
|
Top five strategies for combating modern threats Is anti-virus dead? |
2009 |
71 |
7 |
|
Online Fraud: Mitigation and Detection to Reduce the Threat of Online Crime |
2009 |
793 |
13 |
|
Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones |
2014 |
1285 |
24 |
technical how-to guide—updated for Android 4.4,iOS 7.1, and WindowsPhone and Surface 8.1. |
|
|
|
|
|