Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Introduction to Private Land Mobile Radio (LMR): Dispatch, LTR, APCO, MPT1327, iDEN, and TETRA
Introduction to Private Land Mobile Radio (LMR): Dispatch, LTR, APCO, MPT1327, iDEN, and TETRA
This book explains the different types of private land mobile radio systems, their basic operations, and the services they can provide.

If you are involved or getting involved in land mobile radio technologies and services, this book is for you. This book covers the basics of private land mobile radio systems including traditional...

The Definitive Guide to SUSE Linux Enterprise Server
The Definitive Guide to SUSE Linux Enterprise Server
The Definitive Guide to SUSE Linux Enterprise Server is a comprehensive guide to Novells SUSE Linux Enterprise Server (SLES), one of the most powerful Linux-based server solutions available today. Sander van Vugtnoted author, consultant, and trainerguides you through the most important aspects of SLES, beginning with an in-depth overview...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Beginning Ubuntu LTS Server Administration: From Novice to Professional, Second Edition
Beginning Ubuntu LTS Server Administration: From Novice to Professional, Second Edition
Beginning Ubuntu LTS Server Administration, Second Edition is the touchstone companion book for anyone implementing Ubuntu LTS Server. Author Sander van Vugt introduces the most recent server edition of Ubuntu Linux, the most popular Linux distribution, to power users, system administrators, and programmers and...
Microsoft Windows XP Power Productivity (Mastering)
Microsoft Windows XP Power Productivity (Mastering)
The Keys to Your Productivity Are Right There, Inside Windows

Windows XP is packed with utilities and other features that can help you work smarter and faster. The trick is knowing what they are and how and when to use them. Microsoft Windows XP Power Productivity teaches you how to leverage these tools to automate,...

RSA Security's Official Guide to Cryptography
RSA Security's Official Guide to Cryptography

Learn how cryptography works--from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process, you need the practical advice and proven techniques contained...

Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents
Burdens of Proof: Cryptographic Culture and Evidence Law in the Age of Electronic Documents

The gradual disappearance of paper and its familiar evidential qualities affects almost every dimension of contemporary life. From health records to ballots, almost all documents are now digitized at some point of their life cycle, easily copied, altered, and distributed. In Burdens of Proof, Jean-François Blanchette examines...

Guide to Tactical Perimeter Defense
Guide to Tactical Perimeter Defense

This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first...

SSL & TLS Essentials: Securing the Web
SSL & TLS Essentials: Securing the Web
The Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now—for the first time the details of these critical security...
Deploying Secure 802.11 Wireless Networks with Microsoft Windows
Deploying Secure 802.11 Wireless Networks with Microsoft Windows

Get in-depth technical guidance for deploying a security-enhanced wireless network for your corporate, public, or small business network—direct form the Microsoft Windows Networking and Communications team. This essential reference details the latest IEEE 802.11 and related technologies for public and private wireless LANs, including the...

PhoneGap for Enterprise
PhoneGap for Enterprise

Master the art of building secure enterprise mobile applications using PhoneGap

About This Book

  • Learn how to build secure mobile enterprise apps from scratch using PhoneGap
  • Understand PhoneGap's framework, including common issues and their resolutions, and become the go-to person in...
Software Process Improvement: 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007, Proceedings
Software Process Improvement: 14th European Conference, EuroSPI 2007, Potsdam, Germany, September 26-28, 2007, Proceedings
This textbook is intended for use by SPI (software process improvement) managers and researchers, quality managers, and experienced project and research managers. The papers constitute the research proceedings of the 14th EuroSPI (European Software Process Improvement, www.eurospi.net) conference in Potsdam, September 26-28, 2007, Germany....
Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy