Home | Amazing | Today | Tags | Publishers | Years | Search 
Cryptography and Security Services: Mechanisms and Applications
Cryptography and Security Services: Mechanisms and Applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and...
Information Science
Information Science
From cell phones to Web portals, advances in information and communications technology have thrust society into an information age that is far-reaching, fast-moving, increasingly complex, and yet essential to modern life. Now, renowned scholar and author David Luenberger has produced Information Science, a text that distills and explains...
Data Structures and Algorithms in Java
Data Structures and Algorithms in Java
Fundamental data structures in a consistent object-oriented framework

Now revised to reflect the innovations of Java 5.0, Goodrich and Tamassia’s Fourth Edition of Data Structures and Algorithms in Java continues to offer accessible coverage of fundamental data structures, using a consistent...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Programming Visual Basic 2008: Build .NET 3.5 Applications with Microsoft's RAD Tool for Business
Programming Visual Basic 2008: Build .NET 3.5 Applications with Microsoft's RAD Tool for Business
Ever since Visual Basic was merged into .NET, it's become the core language for creating business applications with Windows. The latest version, VB 2008, is even more useful -- and provides even more incentive for migrating from VB 6. All it lacks is a good book on how to harness its power. Programming Visual Basic 2008 fills the void. Written in a...
New Algorithms, Architectures and Applications for Reconfigurable Computing
New Algorithms, Architectures and Applications for Reconfigurable Computing
New Algorithms, Architectures and Applications for Reconfigurable Computing consists of a collection of contributions from the authors of some of the best papers from the Field Programmable Logic conference (FPL’03) and the Design and Test Europe conference (DATE’03). In all, seventy-nine authors, from research teams from all...
Beginning SQL Server 2008 for Developers: From Novice to Professional
Beginning SQL Server 2008 for Developers: From Novice to Professional
SQL Server 2008 is a first–rate database management system. It offers more capability than any previous release of SQL Server. More than just a classic relational database management system, SQL Server 2008 includes exciting and powerful features that make it useful for everything from large corporate data warehouses to ad hoc departmental...
Sams Teach Yourself Linux Security Basics in 24 Hours
Sams Teach Yourself Linux Security Basics in 24 Hours
This book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included...
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
This book comprehensively surveys the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This book will draw on the diverse expertise in optical sciences and engineering, digital...
Pro SQL Server 2008 Relational Database Design and Implementation (Expert's Voice in SQL Server)
Pro SQL Server 2008 Relational Database Design and Implementation (Expert's Voice in SQL Server)
Learn effective and scalable database design techniques in a SQL Server environment. Pro SQL Server 2008 Relational Database Design and Implementation covers everything from design logic that business users will understand all the way to the physical implementation of the design in a SQL Server database. Grounded in best practices and a...
Wireless Security and Cryptography: Specifications and Implementations
Wireless Security and Cryptography: Specifications and Implementations
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which...
Computer Forensics For Dummies (Computer/Tech)
Computer Forensics For Dummies (Computer/Tech)
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master...
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy