Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
With the rapid increase of computational powers and availability of modern sensing, analysis and rendering equipment and technologies, computers are becoming more and more intelligent. Many research projects and commercial products have demonstrated the capability for a computer to interact with human in a natural way by looking at...
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

Finally--a single volume guide to really effective security for both voice and data wireless networks!

More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless security is now more than a desirable
...

web2py
web2py

The official web2py manual. 3rd Edition. Includes many new pages (537 total).

web2py was launched in 2007 and now, after three years of continuous development, we have reached a very much needed third edition of this book. During this time web2py has managed to win the affection of many knowledgeable users and developers who share...

RailsSpace: Building a Social Networking Website with Ruby on Rails (Addison-Wesley Professional Ruby Series)
RailsSpace: Building a Social Networking Website with Ruby on Rails (Addison-Wesley Professional Ruby Series)
Ruby on Rails is fast displacing PHP, ASP, and J2EE as the development framework of choice for discriminating programmers, thanks to its elegant design and emphasis on practical results. RailsSpace teaches you to build large-scale projects with Rails by developing a real-world application: a social networking website like...
Deploying Cisco Voice over IP Solutions
Deploying Cisco Voice over IP Solutions
If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
Network Security Foundations : Technology Fundamentals for IT Success
Network Security Foundations : Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
Sun Certified Security Administrator for Solaris 9 & 10 Study Guide
Sun Certified Security Administrator for Solaris 9 & 10 Study Guide

Get the book that shows you not only what--but how--to study

  • Complete coverage of all official exam objectives
  • Exam Readiness checklist at the front of the book--you’re ready for the exams when all objectives on the list are checked off
  • Real-world exercises--Step-by-step instruction...
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and...
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments

Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future.

As the Internet becomes the medium of choice for value-added IP service offerings such as TV broadcasting, videoconferencing, and Voice over IP, the ability of automating configuration...

Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
...
unlimited object storage image
Result Page: 51 50 49 48 47 46 45 44 43 42 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy