Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
.Net Framework 4.5 Expert Programming Cookbook
.Net Framework 4.5 Expert Programming Cookbook

.Net is an architecture neutral and programming language agnostic framework that caters to all requirements, varying from business solutions to multiplayer online 3D games. Version 4.5 added many new features to help with the development of robust and user-friendly solutions. This book will teach you the new features as well as the advanced...

Security for Multihop Wireless Networks
Security for Multihop Wireless Networks

Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area...

Getting Started with Meteor.js JavaScript Framework
Getting Started with Meteor.js JavaScript Framework

Creating the most modern, dynamic, multi-user web applications quickly and easily is exactly what Meteor was designed for – and it’s all done in JavaScript. In this tutorial is everything you need to know to get started.

Overview

  • Create dynamic, multi-user web applications completely in...
VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

SyncML: Synchronizing and Managing Your Mobile Data
SyncML: Synchronizing and Managing Your Mobile Data
Effective, standards-based data synchronization will make possible a new generation of breakthrough mobile services. Now, there's an XML-based standard that enables synchronization across virtually any device, platform, application, or service: SyncML. In this book, four leaders of the SyncML community offer an insider's guide to SyncML from both a...
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
PHP 5 E-commerce Development
PHP 5 E-commerce Development

The popularity of online shopping has increased dramatically over the past few years. There are plenty of options available if you not are planning to build your own e-commerce solution but sometimes it's better to use your own solutions. It may be easy to find an e-commerce system but when it comes to extending it or using it you might...

ASP.NET v. 2.0-The Beta Version (2nd Edition) (Microsoft Net Development Series)
ASP.NET v. 2.0-The Beta Version (2nd Edition) (Microsoft Net Development Series)

In this book, three world-class ASP.NET experts present a start-to-finish, developer-focused preview of Microsoft's latest Web development breakthrough: ASP.NET 2.0.

The first book to fully reflect the new ASP.NET 2.0 Beta, ASP.NET v. 2.0—The Beta Version...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

Understanding DB2 9 Security
Understanding DB2 9 Security
Understanding DB2 9 Security is the only comprehensive guide to securing DB2 and leveraging the powerful new security features of DB2 9. Direct from a DB2 Security deployment expert and the IBM® DB2 development team, this book gives DBAs and their managers a wealth of security information that is available nowhere else. It presents real-world...
unlimited object storage image
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy