|
|
|
|
|
| | BeagleBone for Secret Agents
Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware
About This Book
-
Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
- ...
| | Network Security Essentials (2nd Edition)This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols... |
|
Start!: The No Nonsense Guide to Windows XP (Consumer)Because Your Computer Should Improve Your Life, Not Complicate It
No Nonsense Guides are here. With a plainspoken approach, these books are inexpensive starters that are light on idle chat and heavy on practical advice. They're lean and mean and stripped down to fighting weight, so you'll get from point A to point Z with instruction... | | New Algorithms, Architectures and Applications for Reconfigurable ComputingNew Algorithms, Architectures and Applications for Reconfigurable Computing consists of a collection of contributions from the authors of some of the best papers from the Field Programmable Logic conference (FPL’03) and the Design and Test Europe conference (DATE’03). In all, seventy-nine authors, from research teams from all... | | Caution! Wireless Networking: Preventing a Data DisasterSure you’re vulnerable. Now here’s what you do about it
Calm down. There are definite dangers associated with wireless networking, but you hold the antidote in your hands. This guide, written by a respected security consultant, separates the genuine threats from the hype and hysteria. Then it tells you how to guard... |
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |