 |
|
 PC Magazine Home Networking SolutionsLet your network entertain you
At PC Magazine, we've been talking about "media convergence" for years. Network-based home entertainment devices like TiVo and Microsoft's Media Center PC . . . make a home LAN more useful than ever. Chapters 2 and 12 show you how they work.
Ready to set up a network that maximizes your... |  |  The CISSP Prep Guide: Mastering the CISSP and ISSEP Exams, Second EditionPass the CISSP and ISSEP exams with this new edition of the bestselling prep guide!
The U.S. government has mandated that all contractors–nearly all current CISSPs, and those yet to be certified as CISSPs–attain the security engineering subject certification Information Systems Security Engineering Professional (ISSEP). The ISSEP... |  |  Computer Viruses For DummiesBuild up your defenses against online germ warfare
Discover how viruses work and how to outsmart the cyber-thugs who create them
Viruses, worms, and Trojan horses create a serious health problem for your PC, but this handy little book has the antidote! It’ll help you exterminate those nasty bugs and protect your... |
|
|
 Broadband Internet Deployment in Japan (Advanced Information Technology)Japan is well-known as the country where the penetration ratio of the intelligent cellular phone system is large. In 2007, it was reported that in the cellular phone system in Japan, the total volume of data traffic became larger than that of voice traffic. Now, the telecommunication infrastructure is going to be converged with broadcasting... |  |  Guide to Computer Network Security (Computer Communications and Networks)Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these security issues remains elusive, and society continues to... |  |  Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... |
|
|
| Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 |