Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Cryptography (Java Series)
Java Cryptography (Java Series)
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application
programmer's arsenal. Cryptography provides three services that are crucial in secure programming.
These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates,
which prove identity
...
Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

Microsoft System Center 2012 Orchestrator Cookbook
Microsoft System Center 2012 Orchestrator Cookbook

Automate mission-critical tasks with this practical, real-world guide to System Center 2012 Orchestrator

Overview

  • Create powerful runbooks for the entire System Center 2012 product line
  • Master System Center 2012 to create advanced runbooks
  • Learn how to install System Center...
Microsoft Office Word 2003 Inside Out
Microsoft Office Word 2003 Inside Out

Hey, you know your way around a document—so now dig into Word 2003 and really put your word processing expertise to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds all in concise, fast-answer format. It’s all muscle and no fluff. Discover the best and fastest...

Programming Microsoft Visual InterDev 6.0
Programming Microsoft Visual InterDev 6.0
"Visual InterDev promises to become the de facto standard for constructing dynamic, data-driven Web applications for the entire software industry. In fact, many Web sites and applications have already been created using Visual InterDev, and you can expect to see many more as time goes by."

This was the prediction I made in the...

VMware View Security Essentials
VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...

Financial Freedom: A Guide to Achieving Lifelong Wealth and Security
Financial Freedom: A Guide to Achieving Lifelong Wealth and Security

If you're one of the millions of Americans who is buried in credit card debt, or maybe you're having trouble deciphering the fine print on your 401(K)—that is, if you even have a 401(K)!—don't dismay. You can start taking steps toward closing your financial illiteracy gap right away with the sound, practical personal...

Electric Power System Basics for the Nonelectrical Professional (IEEE Press Series on Power Engineering)
Electric Power System Basics for the Nonelectrical Professional (IEEE Press Series on Power Engineering)

A clear and easy-to-follow overview of power system technology for nonelectrical professionals

This book explains the essentials of interconnected electric power systems in very basic, practical terms, giving a comprehensible overview of the terminology, electrical concepts, design considerations, construction practices, operational...

Pounder's Marine Diesel Engines and Gas Turbines, Ninth Edition
Pounder's Marine Diesel Engines and Gas Turbines, Ninth Edition
Since its first appearance in 1950, Pounder's Marine Diesel Engines has served seagoing engineers, students of the Certificates of Competency examinations and the marine engineering industry throughout the world. Each new edition has noted the changes in engine design and the influence of new technology and economic needs on the marine...
Introduction to Paging Systems: One-Way, Two-Way, POCSAG, ERMES, FLEX, REFLEX & INFLEXION
Introduction to Paging Systems: One-Way, Two-Way, POCSAG, ERMES, FLEX, REFLEX & INFLEXION

If you are involved or getting involved in mobile paging technologies, systems, or messaging services, this book is for you. This book explains the different types of paging systems, how they operate, and the changes that are occurring in the paging industry. Traditional paging services have seen a world decline of over 65% in the number of...

How the Internet Works (8th Edition)
How the Internet Works (8th Edition)
Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the...
CCSE NG: Check Point Certified Security Expert Study Guide
CCSE NG: Check Point Certified Security Expert Study Guide
Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management II NG exam, 156-310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides:
  • Assessment testing to focus and direct your studies
  • In-depth...
Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy