Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia Security : Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
Multimedia security has become a major research topic, yielding numerous academic papers in addition to many watermarking-related companies. In this emerging area, there are many challenging research issues that deserve sustained studying towards an effective and practical system. Multimedia Security: Steganography and Digital Watermarking...
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
Linux Firewalls: Attack Detection and Response with iptables, psad, and fwsnort
System administrators need to stay ahead of new security vulnerabilities that leave their networks exposed every day. A firewall and an intrusion detection systems (IDS) are two important weapons in that fight, enabling you to proactively deny access and monitor network traffic for signs of an attack.

Linux Firewalls discusses the...

Microsoft SharePoint 2010 Unleashed
Microsoft SharePoint 2010 Unleashed

Using Microsoft SharePoint 2010 technologies, organizations can bring together, utilize, and collaborate with information from virtually any source. Microsoft SharePoint 2010 Unleashed is the most complete, practical resource for all administrators, managers, architects, users, and power users who want to make the...

Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the...
CompTIA Network+ All-in-One Exam Guide, Fourth Edition
CompTIA Network+ All-in-One Exam Guide, Fourth Edition
All-in-One is All You Need

Get complete coverage of all the material included on the latest release of the CompTIA Network+ exam inside this fully updated, comprehensive resource. Written by CompTIA certification and training expert Mike Meyers, this authoritative exam guide features learning objectives at the beginning of each...

Oracle Application Express 4.0 with Ext JS
Oracle Application Express 4.0 with Ext JS

Oracle Application Express (APEX) is a rapid web application development tool integrated directly into the Oracle database. APEX is a completely web-based application featuring many ready to use components, allowing developers to build and deploy professional web applications rapidly. Using SQL and PL/SQL as the development language it...

Zend Framework 2.0 by Example: Beginner's Guide
Zend Framework 2.0 by Example: Beginner's Guide

ZF2 is the latest update to the well-known Zend Framework. This version has considerably eased the process of building complex web applications with minimal development effort using plug and play components. ZF2 also provides a highly robust and scalable framework for developing web applications.

"Zend Framework 2.0 by...

Twilio Cookbook Second Edition
Twilio Cookbook Second Edition

Have you ever wanted to integrate phone features into a project you were working on? Maybe you wanted to send SMS messages to your customers about the latest sales? Maybe you want to set up a company directory with voice mail? Or maybe you want to add two-factor authentication to your web sites to verify your users? Since Twilio was launched...

Microsoft Dynamics CRM 2011 Reporting and Business Intelligence
Microsoft Dynamics CRM 2011 Reporting and Business Intelligence

Everything you need to know to work with reports in Dynamics CRM 2011

Overview

  • Create reports with SQL Reporting Services for CRM
  • Empower your reports with the different Report Wizards and dashboards
  • Troubleshoot and optimize your reports for better performance
...
Programming Visual Basic 2008: Build .NET 3.5 Applications with Microsoft's RAD Tool for Business
Programming Visual Basic 2008: Build .NET 3.5 Applications with Microsoft's RAD Tool for Business
Ever since Visual Basic was merged into .NET, it's become the core language for creating business applications with Windows. The latest version, VB 2008, is even more useful -- and provides even more incentive for migrating from VB 6. All it lacks is a good book on how to harness its power. Programming Visual Basic 2008 fills the void. Written in a...
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy