|
|
|
|
Expert SQL Server 2008 DevelopmentExpert SQL Server 2008 Development is aimed at SQL Server developers ready to move beyond Books Online. Author and experienced developer Alastair Aitchison shows you how to think about SQL Server development as if it were any other type of development. You’ll learn to manage testing in SQL Server and to properly... | | Multimedia Content Encryption: Techniques and Applications
How to Design a Secure Multimedia Encryption Scheme
The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or... | | Windows 8 Administration Pocket Consultant
Writing Windows 8 Administration Pocket Consultant was a lot of fun—and a
lot of work. As I set out to write this book, my initial goals were to determine
how Windows 8 was different from its predecessors and what new features and
options
were available. As with any new operating system, I had to do a ... |
|
The Art of Deception: Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in... | | Complete Wireless Home NetworkingToday's home wireless networks offer tremendous advantages over hard-wired networks-among them, unprecedented portability and, of course, the freedom from wires strung all over your house! Unless you have a firm grasp on all the latest networking technologies, though, wireless networks won't free you from digging your way through... | | Wi-Fi SecurityCOMPLETE COVERAGE OF THE TECHNOLOGY THAT’S MAKING WIRELESS COMMUNICATIONS VIRTUALLY IMMUNE TO HACKERS!
Wireless technology offers businesses a world of strategic advantages — and a host of security problems. But thanks to McGraw-Hill’s WiFi Security, your company’s mission-critical data can be... |
|
|
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |