Java Cryptography (Java Series) Cryptography, the science of secret writing, is the biggest, baddest security tool in the application
programmer's arsenal. Cryptography provides three services that are crucial in secure programming.
These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates,
which prove identity...
Java Security Solutions Your complete guide to the what, why, where, and how of Java Security
In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...
Microsoft System Center 2012 Orchestrator Cookbook
Automate mission-critical tasks with this practical, real-world guide to System Center 2012 Orchestrator
Create powerful runbooks for the entire System Center 2012 product line
Master System Center 2012 to create advanced runbooks
Learn how to install System Center...
Microsoft Office Word 2003 Inside Out
Hey, you know your way around a document—so now dig into Word 2003 and really put your word processing expertise to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds all in concise, fast-answer format. It’s all muscle and no fluff. Discover the best and fastest...
Programming Microsoft Visual InterDev 6.0 "Visual InterDev promises to become the de facto standard for constructing dynamic, data-driven Web applications for the entire software industry. In fact, many Web sites and applications have already been created using Visual InterDev, and you can expect to see many more as time goes by."
This was the prediction I made in the...
VMware View Security Essentials
Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering...
Introduction to Paging Systems: One-Way, Two-Way, POCSAG, ERMES, FLEX, REFLEX & INFLEXION
If you are involved or getting involved in mobile paging technologies, systems, or messaging services, this book is for you. This book explains the different types of paging systems, how they operate, and the changes that are occurring in the paging industry. Traditional paging services have seen a world decline of over 65% in the number of...
How the Internet Works (8th Edition) Have you ever wanted to know how data travels from computer to computer, around the world? Have you ever wondered how Web sites can track users or how newsgroups work? How the Internet Works shows you how with easy-to-follow, four-color visual spreads tracking the path data flows and the hardware involved. Now entering its fourth year, How the... CCSE NG: Check Point Certified Security Expert Study Guide Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management II NG exam, 156-310. Written by two Check Point security experts who know exactly what it takes to pass the test, this Study Guide provides:
- Assessment testing to focus and direct your studies
|Result Page: 9 8 7 6 5 4 3 2 1 |