 |
|
 |  |  Wireless SecurityGet full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless... |  |  Integrating ISA Server 2006 with Microsoft Exchange 2007Everything IT pros need to know about using ISA Server 2006 to defend their companies' email and remote users from hack attacks!
This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time... |
|
|
|
 Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... |  |  Head First PHP & MySQL (A Brain-Friendly Guide)If you're ready to create web pages more complex than those you can build with HTML and CSS, Head First PHP & MySQL is the ultimate learning guide to building dynamic, database-driven websites using PHP and MySQL. Packed with real-world examples, this book teaches you all the essentials of server-side programming, from the fundamentals... |  |  Kamikaze: Japan's Suicide GodsThe untold story of the Kamikaze pilots, a remarkable piece of military history and one of the most dramatic developments of World War II.
* Gripping real-life stories of life & death. * Contains original material, interviews and new sources including excerpts from a never-before published suicide manual. * Reports... |
|
| Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |