 |
|
 Selected Areas in Cryptography: 9th Annual International Workshop, SAC 2002
SAC 2002 was the Ninth Annual Workshop on Selected Areas in Cryptography. Previous workshops have been held at Queen’s University in Kingston (1994, 1996, 1998, and 1999), Carleton University in Ottawa (1995 and 1997), University of Waterloo (2000), and the Fields Institute in Toronto (2001). The intent of the workshop is to provide a... |  |  Practical Signcryption (Information Security and Cryptography)
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives... |  |  Microsoft Enterprise Library 5.0
Microsoft Enterprise Library is a collection of reusable software components (also known as Application Blocks) that are designed to assist developers with common enterprise development challenges. Before using an Application block, you should have a good understanding of your application requirements and of the scenarios that the Application... |
|
 Beginning ASP.NET Security (Wrox Programmer to Programmer)
Programmers: protect and defend your Web apps against attack!
You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and... |  |  Understanding Voice over IP Security (Artech House Telecommunications Library)
VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which... |  |  Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.
The Program Committee,... |
|
|
 NHibernate 3.0 Cookbook
NHibernate is an innovative, flexible, scalable, and feature-complete open source project for data access. Although it sounds like an easy task to build and maintain database applications, it can be challenging to get beyond the basics and develop applications that meet your needs perfectly.
The NHibernate Cookbook explains each... |  |  Handbook of Financial Cryptography and Security
Cryptography has made a peculiar journey to become a modern science. It had long been
associated with the military and with magic. The rst published work in the eld was
Steganographia, by an alchemist named Trithemius. Although written earlier, the book was
published in 1606. Cryptography has continued this connection with the arcane... |  |  Microsoft SQL Server 2008 Management and Administration
SQL Server 2008 is Microsoft’s latest data platform providing data management and analytical solutions for the enterprise. The platform is trusted, ensures business continuity, and is more predictable and more scalable than ever before. Although similar to SQL Server 2005, SQL Server 2008 offers a tremendous number of new features and... |
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 |