Home | Amazing | Today | Tags | Publishers | Years | Search 
Handbook of Security and Networks
Handbook of Security and Networks
As computing and networking technologies are gradually integrated with every aspect of human lives and activities, computer and network security has become a critical issue. The Handbook of Security and Networks presents a collection of recent advances in computer networking and security areas. These include applied...
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server 2012 Security Cookbook
Microsoft SQL Server is becoming a more mature, more feature-rich, and more secure database management system with each new version. SQL Server 2012 is an enterprise-class relational database server. Sometimes, it might not look like it to the staff whose responsibilities are to deploy it, to create databases and write T-SQL code, and to...
OpenVPN 2 Cookbook
OpenVPN 2 Cookbook

OpenVPN is one of the world's most popular packages for setting up a Virtual Private Network (VPN). OpenVPN provides an extensible VPN framework which has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, or supporting alternative authentication...

OpenStack Cloud Computing Cookbook
OpenStack Cloud Computing Cookbook
OpenStack is an open source software for building public and private clouds, born from Rackspace and NASA. It is now a global success and is developed and supported by scores of people around the globe and backed by some of the leading players in the cloud space today. This book is specifically designed to quickly help you get up...
Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)
CCSP: Secure PIX and Secure VPN Study Guide (642-521 and 642-511)

Here's the book you need to prepare for Cisco's Secure PIX Firewall (CSPFA) and Secure VPN (CSVPN) exams.

This two-in-one Study Guide provides:

  • In-depth coverage of all exam topics
  • Practical information on implementing Cisco's Secure PIX and Secure VPN technologies
  • ...
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...

JavaMail API
JavaMail API
Email was the Internet’s first killer app. One of the most frequently asked questions about Java is how to send email from a Java applet or application. While it’s certainly possible to write a Java program that uses sockets to communicate with mail servers, this requires detailed knowledge of some fairly...
Microsoft SharePoint 2013: Designing and Architecting Solutions
Microsoft SharePoint 2013: Designing and Architecting Solutions

Welcome to Microsoft SharePoint 2013: Designing and Architecting Solutions. The purpose of this book is to help Microsoft SharePoint professionals understand the Microsoft SharePoint 2013 architecture and give them the tools they need to be successful in planning, designing, building, and validating infrastructure architectures. As...

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and wireless network security.? This...

Vision with Direction: A Systematic Introduction to Image Processing and Computer Vision
Vision with Direction: A Systematic Introduction to Image Processing and Computer Vision

This introductory textbook presents the modern signal processing concepts used in computer vision and image analysis in a systematic and mathematically coherent way. For the first time in a textbook on image processing, single direction, group direction, corners and edges, Hough transform, and motion estimation are developed in a principled...

MongoDB: The Definitive Guide
MongoDB: The Definitive Guide

Manage the huMONGOus amount of data collected through your web application with MongoDB. This authoritative introduction—written by a core contributor to the project—shows you the many advantages of using document-oriented databases, and demonstrates how this reliable, high-performance system allows for almost infinite...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy