Network Infrastructure Security Research on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... Cryptography and Security Services: Mechanisms and Applications Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and...
Security Assessment: Case Studies for Implementing the NSA IAM The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... Mobile TV: DVB-H, DMB, 3G Systems and Rich Media Applications Exclusively dedicated to Mobile TV, this book provides a detailed insight to mobile multimedia characterized efficient compression techniques, protocols formalized by 3GPP or 3GPP2, capabilities of broadcast, and mobile networks for delivering multimedia content. Network requirements such as spectrum; chipsets, software and handsets which enable... BEA WebLogic Server 8 for Dummies Welcome to BEA WebLogic Server 8 For Dummies. Whether you are an
administrator, a developer, a manager, or all of the above, you will find
something in this book to make your job easier.
WebLogic is the most widely used application server on the market today.
You can use WebLogic in large or small projects and to develop...
|Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 |