 |
|
|
 |  |  Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services.... |  |  |
|
 Information Assurance: Managing Organizational IT Security RisksWritten by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted... |  |  Understanding IPv6, Second EditionNow updated for Windows Server 2008 and Windows Vista, this guide delivers in-depth technical information on Internet Protocol version 6 (IPv6). IPv6 greatly improves on IPv4, the current protocol, by vastly increasing the number of available addresses and by adding enhancements for security, multimedia traffic management, routing, and network... |  |  Maximum Linux Security (2nd Edition)Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.
Maximum Linux Security helps Linux administrators identify and plug security holes... |
|
 Professional CodeIgniterIf you’re a PHP developer, you can build Rails-like applications without learning a new language by following the hands-on tutorials in Professional CodeIgniter. In this book, find an overview of MVC and agile technologies, model and schema for products, helpers and libraries, Ajax and Scriptaculous, and explanations of the creation... |  |  The OPEN Process Framework: An IntroductionThe OPEN Process Framework provides a template for generating flexible, yet disciplined, processes for developing high-quality software and system applications within a predictable schedule and budget. Using this framework as a starting point, you can create and tailor a process to meet the specific needs of the project.
If you are a project... |  |  Network Security: A Practical Guide (Computer Weekly Professional)Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, from both an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those... |
|
| Result Page: 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 |