Home | Amazing | Today | Tags | Publishers | Years | Search 
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the...
Maximum Windows 2000 Security (Maximum Security)
Maximum Windows 2000 Security (Maximum Security)
Written from the hacker's perspective, Maximum Windows 2000 Security is a comprehensive, solutions-oriented guide to Windows 2000 security.

Topics include:

  • Physical & File System Security,
  • Password Security,
  • Malicious Code,
  • Windows 2000 Network Security Architecture and Professional...
  • The Art of Strategic Planning for Information Technology, 2nd Edition
    The Art of Strategic Planning for Information Technology, 2nd Edition
    The acclaimed IT strategic planning methodology now completely revised for the new millennium!

    Bernard Boar, internationally recognized expert and IT consultant for Fortune 500 companies, overhauls his bestselling book on IT strategy to help IT professionals take on the new challenges of the hyper-competitive digital age. From assessing your...

    Security of e-Systems and Computer Networks
    Security of e-Systems and Computer Networks
    E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
    An Introduction to Web Design and Programming
    An Introduction to Web Design and Programming
    Combining viewpoints from a Department of Computer Science (Paul Wang) and a School of Visual Communication Design (Sanda Katila), this innovative book covers the design and technology aspects of Web site development in an integrated manner. The balanced perspective leads to an understanding of the artistic design, visual communication, information...
    Crypto Anarchy, Cyberstates, and Pirate Utopias
    Crypto Anarchy, Cyberstates, and Pirate Utopias

    In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

    Itanium Architecture for Software Developers
    Itanium Architecture for Software Developers
    "Reading the Itanium Architecture for Software Developers book saved us days, maybe weeks on project development." -- Dong Wei, System Architect for Servers, Hewlett-Packard

    Product Description
    This unique description of the Intel® Itanium™ application architecture helps
    ...
    WPF Recipes in C# 2008: A Problem-Solution Approach (Expert's Voice in .Net)
    WPF Recipes in C# 2008: A Problem-Solution Approach (Expert's Voice in .Net)
    WPF offers amazing new opportunities to .NET programmers in terms of the user interfaces they can deliver to their customers. But this significant technological advance comes with a steep learning curve, requiring the programmer to learn new classes, new syntax, and an entirely new approach to UI development.

    Although WPF has been generally...

    Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information Security)
    Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information Security)
    Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.

    This volume provides state of the art in...

    Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
    Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
    Introducing service orientation as a vision and philosophy that can impact a business, this innovative new book equips the reader to:
    • Best use technology resources to meet goals
    • Unleash their "inner nerd" to embrace IT as part of their business as a whole
    • Address the "mother of all business...
    Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)
    Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)
    Plan and launch your PPC campaign and keep track of its progress

    If you want potential customers to form a traffic jam at your Web site, Pay Per Click just might do the trick. This book will help you decide! It tells you all about Google AdWords and Yahoo! Sponsored Search, targeting your customers, watching out for fraud, assessing the pros...

    Going Wireless: Transform Your Business with Mobile Technology
    Going Wireless: Transform Your Business with Mobile Technology
    Going Wireless delivers the unexpected by showing how wireless is transforming every type of enterprise from micro-businesses to multi-national conglomerates.

    Award-winning technology journalist Jaclyn Easton begins with an in-depth look at owning your customers and clients through mobile commerce -- whether your company focuses on...

    Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 
    ©2024 LearnIT (support@pdfchm.net) - Privacy Policy