Active and Programmable Networks for Adaptive Architectures and Services New applications such as video conferencing, video on demand, multimedia transcoders, Voice-over-IP (VoIP), intrusion detection, distributed collaboration, and intranet security require advanced functionality from networks beyond simple forwarding congestion control techniques. Examples of advanced functionality include self-reconfiguration,... Wireless Security Handbook This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this...
Information Security Management Handbook, Volume 7
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...
Complete Guide to CISM Certification
Complete Guide to CISMÐ® Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,...
High-Performance Web Databases: Design, Development, and Deployment IN THE PAST FEW DECADES, DATABASE SOLUTIONS AND DATA MANAGEMENT OPERATIONS HAVE SUPPORTED AN EVER-EXPANDING RANGE OF SOLUTIONS AND TECHNOLOGY ARCHITECTURES.
There is no abatement to this trend. Many end-to-end Information Technology (IT) solutions in the current environment include access to the World Wide Web and integration with one...
|Result Page: 20 19 18 17 16 15 14 13 12 11 |