Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Expert SQL Server 2008 Encryption
Expert SQL Server 2008 Encryption

Every day organizations large and small fall victim to attacks on their data. Encryption provides a shield to help defend against intruders. Because of increasing pressure from government regulators, consumers, and the business community at large, the job descriptions of SQL DBAs and developers are expanding to include encryption. Expert SQL...

Cisco Router Firewall Security
Cisco Router Firewall Security

The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches...

MCTS Self-Paced Training Kit (Exam 70-536): Microsoft® .NET Framework Application Development Foundation, Second Edition
MCTS Self-Paced Training Kit (Exam 70-536): Microsoft® .NET Framework Application Development Foundation, Second Edition
Exam Prep Guide Ace your preparation for the skills measured by MCTS Exam 70-536 and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you ve learned by applying your knowledge to real-world case scenarios and labs. This official Microsoft study guide is designed to...
The Modern C++ Challenge: Become an expert programmer by solving real-world problems
The Modern C++ Challenge: Become an expert programmer by solving real-world problems

Test your C++ programming skills by solving real-world programming problems covered in the book

Key Features

  • Solve a variety of real-world programming and logic problems by leveraging the power of C++17
  • Test your skills in using language features, algorithms, data...
Cryptography for Developers
Cryptography for Developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent
...
Pro ASP.NET 2.0 in VB 2005, Special Edition
Pro ASP.NET 2.0 in VB 2005, Special Edition

Welcome to Pro ASP.NET 2.0 in VB 2005, Special Edition. In this book, you'll learn how ASP.NET 2.0 really works. You won't be bored with a rehash of the VB 2005 language--instead, you'll get the hard-won practical advice that you need to build sophisticated, scalable websites. New features are clearly identified, so if you've programmed...

Windows Server 2012 R2 Inside Out Volume 1: Configuration, Storage, & Essentials
Windows Server 2012 R2 Inside Out Volume 1: Configuration, Storage, & Essentials

This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds for Windows Server 2012 R2 - with a focus on configuration, storage, and essential administrative tasks.

Coverage includes:

  • Deployment
  • Boot configuration
  • ...
IPv6 Essentials
IPv6 Essentials
IPv6, the next generation Internet Protocol, has been in the works since the early 90s when the rapid growth of the Internet threatened to exhaust existing IP addresses. Drawing on 20 years--operational experience with the existing protocol (IPv4), the new protocol offers scalability, increased security features, real-time traffic support, and...
Data-driven Block Ciphers for Fast Telecommunication Systems
Data-driven Block Ciphers for Fast Telecommunication Systems
The Most Progressive and Complete Guide to DDO-Based Ciphers

Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive...

Information Security for Automatic Speaker Identification
Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security systems. In remote access systems, speaker utterances are recoded and communicated through a communication channel to a receiver that performs the identification process. Speaker identification is based on characterizing each speaker with a set of features...
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business provides in plain English a no–nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies. This book explains how to use a Cisco router to setup cable modems, DSL and PPPoE, and explains how to configure NAT, Access Control Lists, Firewalls,...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy