|
|
|
|
Ubuntu: The Complete Reference (Complete Reference Series)The Definitive Guide to Ubuntu--Covers Ubuntu 8.04 LTS
Maximize the powerful features of Ubuntu with expert guidance, tips, and techniques from bestselling Linux author Richard Petersen. Packed with clear explanations and detailed examples, this comprehensive volume shows you how to get off the ground with Ubuntu, set up... | | RESTful Java Web Services Security
Secure your RESTful applications against common vulnerabilities
About This Book
-
Learn how to use, configure, and set up tools for applications that use RESTful web services to prevent misuse of resources
-
Get to know and fix the most common vulnerabilities of RESTful web services APIs
... | | Auditing Information SystemsAuditing Information Systems, Second Edition, explains clearly how to audit the controls and security over all types of information systems environments. The concepts and techniques in the book enable auditors, information security professionals, managers, and audit committee members of every knowledge and skill level to truly... |
|
Digital Communications: Fundamentals and Applications (2nd Edition)Master every key digital communications technology, concept, and technique.
Digital Communications, Second Edition is a thoroughly revised and updated edition of the field's classic, best-selling introduction. With remarkable clarity, Dr. Bernard Sklar introduces every digital communication technology at the heart of today's wireless... | | Computer Forensics: Computer Crime Scene Investigation (Networking Series)The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package... | | Seven Deadliest Wireless Technologies Attacks
Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more... |
|
|
Pairing-Based Cryptography - Pairing 2010: 4th International Conference
This book constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing 2010, held in Yamanaka Hot Spring, Japan, in December 2010. The 25 full papers presented were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections on: efficient software... | | Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a... | | Privacy on the Line: The Politics of Wiretapping and EncryptionIn the spring of 1993, the White House announced an unprecedented plan for both promoting and controlling the use of secret codes to keep communications private. The plan, formally called key escrow but popularly known as "Clipper" after its star component, the Clipper chip, was to adopt a new federal standard for... |
|
|
Result Page: 10 9 8 7 6 5 4 3 2 1 |