Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Access 2007 VBA Programmer's Reference
Access 2007 VBA Programmer's Reference
Access 2007 VBA Programmer's Reference

Written by Access MVPs and Microsoft Access testers, this resource will give you the tools to leverage Access 2007's built-in functionality and VBA in order to build more dynamic applications. It explores all aspects of VBA programming for Access and describes the latest innovations. You'll also find...

Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Maximize the powerful capabilities of Red Hat Enterprise and Fedora Linux using this
comprehensive and up-to-date reference. You'll get full details on everything from installation and
configuration to system administration and server management of Enterprise Linux-with specifics
on the Linux Kernel 2.6. Thorough security coverage
...
Java I/O
Java I/O
Because it doesn't provide a printf() function like C/C++, some developers think Java isn't up to snuff with files and streams. Author Rusty Harold Elliotte argues against this notion in Java I/O, a book that shows how Java's stream support can help simplify network programming, internationalization, and even compression and...
Amazon S3 Cookbook
Amazon S3 Cookbook

Over 30 hands-on recipes that will get you up and running with Amazon Simple Storage Service (S3) efficiently

About This Book

  • Learn how to store, manage, and access your data with AWS SDKs
  • Study the Amazon S3 pricing model and learn how to calculate costs by simulating practical...
Cryptography in C and C++
Cryptography in C and C++
  • Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
  • Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
  • Not toy code(tm), but a practical treatment of modern cryptographic...
Wireless Communications Security (Artech House Universal Personal Communications)
Wireless Communications Security (Artech House Universal Personal Communications)
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography...
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
A timely reference in the innovative and cutting-edge field of multimedia security!

Digital Rights Management (DRM) defines a set of tools that manage the secured use of digital media content found on static and mobile electronic devices, ranging from personal computers and PDAs to digital video recorders and MP3
...
Qmail Quickstarter: Install, Set Up and Run your own Email Server
Qmail Quickstarter: Install, Set Up and Run your own Email Server

A fast-paced and easy-to-follow, step-by-step guide that gets you up and running quickly

  • Qmail Basics
  • Storing and retrieving of emails
  • Virtualisation
  • Filtering Spam
  • Hosting Multiple Domains, Encryption, and Mailing Lists

In Detail

This book...

Recent Advances in Communication Infrastructure: Proceedings of ICPCCI 2019 (Lecture Notes in Electrical Engineering)
Recent Advances in Communication Infrastructure: Proceedings of ICPCCI 2019 (Lecture Notes in Electrical Engineering)

This book gathers selected research papers presented at the International Conference on Power, Control and Communication Infrastructure 2019 (ICPCCI 2019), organized by the Institute of Infrastructure, Technology, Research and Management (IITRAM), Ahmedabad, Gujarat, India, on July 4–5, 2019. It presents technological...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
Ethernet Passive Optical Networks (McGraw-Hill Communications Engineering)
THE DEFINITIVE GUIDE TO EPON
Written by one of the authors of the IEEE802.3ah standard, this is the first book to fully explain the EPON architecture, analyze its performance, and annotate the standard.

Clearly addressing efficiency, performance, and implementation issues, Ethernet Passive Optical Networks...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy