Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protected: Internet, Intranet, & Virtual Private Networks

Buy
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web technologies and the distributed information processing technologies connected with them that are based on mobile programs are described, as are the network technologies that influence security. Also covered are the methods of attacking computer networks and practical guidelines for protecting a virtual network.

About the Author
A. Moldovyan is the author of more than 60 articles on information protection. N. Moldovyan is head researcher at a specialized center for software systems. D. Summerville is assistant professor of electrical engineering at the State University of New York. He lives in Binghampton, New York. V. Zima is the author of 19 scientific articles.
(HTML tags aren't allowed.)

Retail Branding and Store Loyalty: Analysis in the Context of Reciprocity, Store Accessibility, and Retail Formats (Handel und Internationales Marketing Retailing and International Marketing)
Retail Branding and Store Loyalty: Analysis in the Context of Reciprocity, Store Accessibility, and Retail Formats (Handel und Internationales Marketing Retailing and International Marketing)

Marketers and retailers have to understand how to manage different consumer perception levels of retail brands, which have a major determining role on store loyalty across different complex contexts. Addressing these issues, Bettina Berg analyzes first whether corporate reputation and retail store equity have a reciprocal relationship in...

Swarm Intelligence: Introduction and Applications (Natural Computing Series)
Swarm Intelligence: Introduction and Applications (Natural Computing Series)
The laws that govern the collective behavior of social insects, flocks of birds, or fish schools continue to mesmerize researchers. While individuals are rather unsophisticated, in cooperation they can solve complex tasks, a prime example being the ability of ant colonies to find shortest paths between their nests and food sources. Task-solving...
Advertising For Dummies (Business & Personal Finance)
Advertising For Dummies (Business & Personal Finance)
Advertising, despite whatever impressions you have or information you’ve heard, isn’t complicated — or rather, it’s only as complicated as you want it to be. Sure, a lot is involved with advertising. Print, broadcast, outdoor, direct mail, collateral materials, Internet — each media has its own positives and negatives,...

HTML5 in Action
HTML5 in Action

Summary

HTML5 in Action provides a complete introduction to web development using HTML5. You'll explore every aspect of the HTML5 specification through real-world examples and code samples. It's much more than just a specification reference, though. It lives up to the name HTML5 in Action by...

Apache Solr 4 Cookbook
Apache Solr 4 Cookbook

Apache Soir 4 can transform the effectiveness of your search engines and this book will show you how. Jump straight into the hands-on recipes and get a fast understanding of the latest and greatest in open source search.

Overview

  • Learn how to make Apache Solr search faster, more complete, and...
Developing Microsoft SharePoint Applications Using Windows Azure
Developing Microsoft SharePoint Applications Using Windows Azure

Microsoft SharePoint and Windows Azure are two sizeable platforms unto themselves. SharePoint is one of Microsoft’s leading server productivity platforms—a collaborative platform for the enterprise and the web. Windows Azure is Microsoft’s operating system in the cloud. Separately, they have their own strengths, market...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy