 |
|
 Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |  |  Mobile Telemedicine: A Computing and Networking PerspectiveWireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has... |  |  |
|
 Cisco Voice over IP (CVOICE) (Authorized Self-Study Guide) (3rd Edition)Cisco Voice over IP (CVOICE), Third Edition, is a Cisco-authorized, self-paced learning tool for CCVP foundation learning. This book provides you with the knowledge and skills required to plan, design, and deploy a Cisco voice-over-IP (VoIP) network and to integrate gateways and gatekeepers into an enterprise VoIP network. By reading this... |  |  Beginning XML with C# 2008: From Novice to Professional (Expert's Voice in .Net)Beginning XML with C# 2008 focuses on XML and how it is used within .NET 3.5. As you’d expect of a modern application framework, .NET 3.5 has extensive support for XML in everything from data access to configuration, from raw parsing to code documentation. This book demystifies all of this. It explains the basics of XML as well as... |  |  Genetics Databases (Biological Techniques Series)Computer access is the only way to retrieve up-to-date nucleic acid and protein sequence and structure information. This book, edited by Martin Bishop, describes the available information and where to find it, and is essential reading for any researcher puzzled by the wealth of on-line data. The reader will be guided through the maze of... |
|
|
 Bulletproofing TCP/IP Based Windows NT/2000 NetworksFind out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of... |  |  The Official CHFI Study Guide (Exam 312-49)This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide. It was written for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI certification, and professionals needing the skills to identify an... |  |  |
|
| Result Page: 311 310 309 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 |