|
|
|
|
| | Cryptography in C and C++
-
Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
-
Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
-
Not toy code(tm), but a practical treatment of modern cryptographic
... | | Writing Secure Code, Second EditionIf you design applications, or if you build, test, or document solutions, you need this book. If your applications are Web-based or Win32-based, you need this book. Finally, if you are currently learning or building Microsoft .NET Framework–based applications, you need this book. In short, if you are involved in building... |
|
Joel on SoftwareThis is a selection of essays from the author's Web site, http://www.joelonsoftware.com. Joel Spolsky started the web log in March 2000 in order to offer his insights, based on years of experience, on how to improve the world of programming. His extraordinary writing skills, technical knowledge, and caustic wit have made him a programming guru.... | | HackNotes(tm) Linux and Unix Security Portable ReferenceHackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and... | | AdvancED ActionScript Components: Mastering the Flash Component ArchitectureMacromedia's architecture is like a chest filled with precious jewels, and this book is quite simply the key to open it! One of the most important tools provided with Flash is the Macromedia Component Architecture: a framework of components written in ActionScript 2, based on established design patterns, that provides a wealth of functionality you... |
|
Mac OS X Advanced Development Techniques Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.
The book concentrates on teaching Cocoa development first, and then takes that knowledge and... | | Adobe Flex 2: Training from the SourcePart of the Adobe Training from the Source series, the official curriculum from Adobe, developed by experienced trainers. Using project-based tutorials, this book/CD volume is designed to teach the techniques needed to create sophisticated, professional-level projects. Each book includes a CD that contains all the files used in the lessons, plus... | | Hardening Linux"Hardening" is the process of protecting a system and its applications against unknown threats. And Hardening Linux will explain the main steps that any Network or Systems Administrator needs to take, to protect his computers that run on Linux. This book discusses security of mail servers, web servers, and file servers, as well as... |
|
|
|
Result Page: 486 485 484 483 482 481 480 479 478 477 476 475 474 473 472 471 470 469 468 |