Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security and Cryptography
Computer Security and Cryptography

Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect...

Mastering Network Security
Mastering Network Security
Do you need to secure your network? Here's the book that will help you implement and maintain effective network security, no matter what size your network is or which NOS you're using. Packed with practical advice and indispensable information, this book systematically identifies the threats that your network faces and explains how to eliminate or...
Wireless Security and Cryptography: Specifications and Implementations
Wireless Security and Cryptography: Specifications and Implementations
As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which...
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography

In his first book since the bestselling Fermat's Enigma, Simon Singh offers the first sweeping history of encryption, tracing its evolution and revealing the dramatic effects codes have had on wars, nations, and individual lives. From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies...

CCSP SECUR Exam Certification Guide (CCSP Self-Study, 642-501)
CCSP SECUR Exam Certification Guide (CCSP Self-Study, 642-501)
Prepare for the new CCSP SECUR 642-501 exam with the only Cisco authorized SECUR preparation guide available
  • The only SECUR guide developed in conjunction with Cisco, providing the most accurate and up-to-date topical coverage
  • Electronic testing engine on CD-ROM provides flexible assessment features and feedback on...
TCP/IP For Dummies (Computer/Tech)
TCP/IP For Dummies (Computer/Tech)
Packed with the latest information on TCP/IP standards and protocols

TCP/IP is a hot topic, because it's the glue that holds the Internet and the Web together, and network administrators need to stay on top of the latest developments. TCP/IP For Dummies, 6th Edition, is both an introduction to the basics for...

Developing Web Services with Apache Axis2
Developing Web Services with Apache Axis2

If you'd like to learn how to create web services (in particular, using Apache Axis2) and make some sense of various standards like SOAP, WSDL, MTOM, WS-Addressing, WS-Security, WS-Policy, XML Encryption and XML Signature, then this book is for you. Why? First, it has a tutorial style that walks you through in a step-by-step manner....

Beginning ASP.NET Security (Wrox Programmer to Programmer)
Beginning ASP.NET Security (Wrox Programmer to Programmer)

Programmers: protect and defend your Web apps against attack!

You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and...

Understanding Web Services Specifications and the WSE
Understanding Web Services Specifications and the WSE

Explore the emerging specifications—and the latest tools—for implementing advanced Web services using Microsoft technologies. Keep pace with evolving Web services specifications—and get developer-to-developer insights for using them to deliver advanced, interoperable solutions for Microsoft .NET. This guide provides a...

The Design of Rijndael: AES - The Advanced Encryption Standard
The Design of Rijndael: AES - The Advanced Encryption Standard

In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology.|This book by the designers of the block cipher presents...

Modern Cryptography: Protect Your Data with Fast Block Ciphers
Modern Cryptography: Protect Your Data with Fast Block Ciphers
This book gives a general picture of modern cryptography. At the same time, it covers specific issues related to developing fast block ciphers using software and/or hardware implementation in a way that is easily understandable to a wide circle of readers. The material dedicated to the meaning of cryptography in informational society, two-key...
Introducing Microsoft  Windows Vista
Introducing Microsoft Windows Vista
Your insider's preview of the next release of Microsoft Windows.

What's new and improved in the newest release of the Microsoft Windows family of client operating systems? Which versions of Windows Vista are right for you and your organization? How will the new features and capabilities in Windows Vista improve security, make users more
...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy