Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
Boosting-Based Face Detection and Adaptation (Synthesis Lectures on Computer Vision)
With the rapid increase of computational powers and availability of modern sensing, analysis and rendering equipment and technologies, computers are becoming more and more intelligent. Many research projects and commercial products have demonstrated the capability for a computer to interact with human in a natural way by looking at...
SQL Server 2000 Administration (Book/CD-ROM)
SQL Server 2000 Administration (Book/CD-ROM)
Get cutting-edge techniques for managing SQL Server 2000.

Provide a scalable, replicated, and reliable foundation for your database-driven e-commerce applications. Packed with up-to-date information, real-world examples, and hands-on solutions, SQL Server 2000 Administration covers installation, configuration, system architecture, security,...

Zend Framework in Action
Zend Framework in Action
From rather humble beginnings as the Personal Home Page scripting language, PHP has found its way into almost every server, corporation, and dev shop in the world. On an average day, somewhere between 500,000 and 2 million coders do something in PHP. Even when you use a well-understood language like PHP, building a modern web application...
Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Mastering phpMyAdmin 3.3.x for Effective MySQL Management
Mastering phpMyAdmin 3.3.x for Effective MySQL Management

phpMyAdmin is an open source tool written in PHP. It handles the administration of MySQL over the World Wide Web (WWW). It can perform various tasks, such as creating, modifying, or deleting databases, tables, fields, or rows. It can also execute SQL statements and manage users and their permissions. When it comes to exploiting phpMyAdmin to...

Ubiquitous Multimedia and Mobile Agents: Models and Implementations
Ubiquitous Multimedia and Mobile Agents: Models and Implementations

Ubiquitous multimedia systems, or mobile multimedia systems, offer the promise of pervasive delivery of multimedia content to mobile users and their handheld devices.

Ubiquitous Multimedia and Mobile Agents: Models and Implementations provides the hybridization of two paradigms, namely, ubiquitous/mobile multimedia and mobile...

Security in Sensor Networks
Security in Sensor Networks

Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities.

Security in Sensor Networks covers all aspects of the subject, serving as an invaluable reference for researchers,
...

ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
Amazon Web Services for Mobile Developers: Building Apps with AWS
Amazon Web Services for Mobile Developers: Building Apps with AWS

A practical, real-world introduction to AWS tools and concepts

Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and technical/solution architects. Cloud computing is a rapidly expanding ecosystem, and...

Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services....
unlimited object storage image
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy