Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
Crypto Dictionary is your full reference resource for all things cryptography.

Cryptography from A5/0 to ZRTP
 
Expand your mind—and your crypto knowledge—with the ultimate desktop dictionary for all things cryptography. Written by a globally recognized cryptographer for
...
The Modern C++ Challenge: Become an expert programmer by solving real-world problems
The Modern C++ Challenge: Become an expert programmer by solving real-world problems

Test your C++ programming skills by solving real-world programming problems covered in the book

Key Features

  • Solve a variety of real-world programming and logic problems by leveraging the power of C++17
  • Test your skills in using language features, algorithms, data...
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)

 “Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Windows Server 2012 R2 Inside Out Volume 1: Configuration, Storage, & Essentials
Windows Server 2012 R2 Inside Out Volume 1: Configuration, Storage, & Essentials

This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds for Windows Server 2012 R2 - with a focus on configuration, storage, and essential administrative tasks.

Coverage includes:

  • Deployment
  • Boot configuration
  • ...
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design

Sometimes you have to do good engineering to straighten out twisted politics. The Electronic Frontier Foundation, a nonprofit organization that was founded to ensure that the principles embodied in the Constitution and Bill of Rights are protected as new communications technologies emerge, and O"Reilly, the premier publisher of computer...

Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

.NET Security and Cryptography
.NET Security and Cryptography

Security and cryptography, while always an essential part of the computing industry, have seen their importance increase greatly in the last several years. Microsoft's .NET Framework provides developers with a powerful new set of tools to make their applications secure. .NET Security and...

Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

Expert Web Services Security in the .NET Platform
Expert Web Services Security in the .NET Platform

Any company using .NET will eventually (if it hasn't already) expose part of its functionality as a .NET Web service, and securing these features will become job number one. Completely up to date for the latest version of Visual Studio .NET, Expert Web Services Security in the .NET Platform is a comprehensive treatment on how to...

Pro T-SQL 2012 Programmer's Guide
Pro T-SQL 2012 Programmer's Guide

Pro T–SQL 2012 Programmer’s Guide is every developer’s key to making full use of SQL Server 2012’s powerful, built–in Transact–SQL language. Discussing new and existing features, the book takes you on an expert guided tour of Transact–SQL functionality. Fully functioning examples and...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy