Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
SAP® NetWeaver Portal Technology: The Complete Reference
SAP® NetWeaver Portal Technology: The Complete Reference
Your Hands-on Guide to SAP NetWeaver Portal Technology

Master SAP NetWeaver Portal with the most comprehensive, step-by-step reference available on the entire portal implementation life cycle. Written by SAP architect Rabi Jay, this book provides everything you need to plan, design, install, configure, and administer SAP...

Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments
Service Automation and Dynamic Provisioning Techniques in IP/MPLS Environments

Save time & resources with this comprehensive guide to automation configuration for the value-added IP services of the future.

As the Internet becomes the medium of choice for value-added IP service offerings such as TV broadcasting, videoconferencing, and Voice over IP, the ability of automating configuration...

Linux Security (Networking)
Linux Security (Networking)
This book provides you with comprehensive knowledge about Linux Security. The book is aimed at readers who are familiar with Linux concepts but now want to gain a solid foundation in Linux security features. It is assumed these readers already understand some Linux and networking concepts, such as network protocols, network servers, and so on. This...
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
This book comprehensively surveys the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This book will draw on the diverse expertise in optical sciences and engineering, digital...
Linux Apache Web Server Administration (Linux Library)
Linux Apache Web Server Administration (Linux Library)
Authoratative Answers to All Your Apache Questions—Now Updated to Cover Apache 2.0

Linux Apache Web Server Administration is the most complete, most advanced guide to the Apache Web server you’ll find anywhere. Written by a leading Apache expert—and now updated to
...
Sams Teach Yourself Linux Security Basics in 24 Hours
Sams Teach Yourself Linux Security Basics in 24 Hours
This book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included...
VoiceXML: 10 Projects to Voice Enable Your Web Site
VoiceXML: 10 Projects to Voice Enable Your Web Site

Build 10 ready-to-use VoiceXML applications!

Following an introduction to VoiceXML and a review of how to set up your work environment, Mark Miller guides you through the steps to building ten complete programs that utilize VoiceXML and related technologies to create fully functional solutions. Each project begins with a clear...

Middleware for Communications
Middleware for Communications
"The book addresses telecommunications workers, developers, middleware researchers, software engineers, and software architects." (IT Professional, July/August 2004)

A state-of-the-art guide to middleware technologies, and their pivotal role in communications networks.

Middleware is...

Programming Visual Basic 2008: Build .NET 3.5 Applications with Microsoft's RAD Tool for Business
Programming Visual Basic 2008: Build .NET 3.5 Applications with Microsoft's RAD Tool for Business
Ever since Visual Basic was merged into .NET, it's become the core language for creating business applications with Windows. The latest version, VB 2008, is even more useful -- and provides even more incentive for migrating from VB 6. All it lacks is a good book on how to harness its power. Programming Visual Basic 2008 fills the void. Written in a...
Distributed Computing: Principles, Algorithms, and Systems
Distributed Computing: Principles, Algorithms, and Systems
Designing distributed computing systems is a complex process requiring a solid understanding of the design problems and the theoretical and practical aspects of their solutions. This comprehensive textbook covers the fundamental principles and models underlying the theory, algorithms and systems aspects of distributed computing. Broad and detailed...
ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy