|
|
|
|
|
Citrix XenApp Platinum Edition for Windows: The Official GuideThe Authorized Guide to Citrix XenApp Platinum Edition for Windows
Design, deploy, and maintain a virtualized, on-demand enterprise application delivery infrastructure. Citrix XenApp Platinum Edition for Windows: The Official Guide explains how to ensure high availability, enhance productivity, and reduce costs... | | Reflectarray AntennasDescribes the configuration and principles of a reflectarray antenna, its advantages over other antennas, the history of its development, analysis techniques, practical design procedures, bandwidth issues and wideband techniques, as well as applications and recent developments. Both authors are well respected practitioners who have build these... | | Pro Novell Open Enterprise ServerThis book is about Novell Open Enterprise Server. With Open Enterprise Server, Novell launched a new generation of server operating system, following a 20-year long tradition with NetWare. Open Enterprise Server is unique in the industry due to its two versions: one for Linux and another for NetWare. This book is meant as a guide to Open Enterprise... |
|
| | | | Hack Proofing Your IdentityThe use of a seal, card, or other identification while making a purchase or signing a contract is a custom almost as old as history. As merchants and their customers have begun using the Internet in recent years to conduct business online, they have been challenged to find digital forms of identification that mimic traditional, ... |
|
Computer Privacy AnnoyancesFrom the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances... | | Security in Computing, Third EditionSecurity in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike.
This sweeping revision of the field's classic guide to computer... | | Phishing ExposedPhishing Exposed provides an in-depth, high-tech view from both sides of the phishing playing field. In this unprecedented book, world-renowned phishing expert Lance James exposes the technical and financial techniques used by international clandestine phishing gangs to steal billions of dollars every year. The book is filled with... |
|
|
Result Page: 9 8 7 6 5 4 3 2 1 |