|
|
|
|
|
| | CYA: Securing Exchange Server 2003 & Outlook Web AccessCoverage includes: Exchange 2000 Administrative Rights, Mailbox Rights, Denial of Service and Exchange, Types of File Vulnerabilities, Vulnerability of Transmitted Data, Message Authenticity, Event Service and Event Sinks, Message Relay via SMTP, Preventing Exchange Security Problems, The W2K/IIS Platform Must Be Solid, Dedicate Servers to Specific... | | Introduction to Algorithms, Second EditionThe book moves forward with more advanced algorithms that implement strategies for solving more complicated problems (including dynamic programming techniques, greedy algorithms, and amortized analysis). Algorithms for graphing problems (used in such real-world business problems as optimizing flight schedules or flow through pipelines) come next.... |
|
Microsoft Windows 7 UnleashedCovers Release Candidate of Windows 7.
With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.
Microsoft® Windows 7 Unleashed... | | XML, Web Services, and the Data Revolution (Technology Series)"Frank Coyle's XML,Web Services, and the Data Revolution does a great job of explaining the XML phenomenon by clearly describing where it came from, why it has proved so useful, and where it is likely to take us."—Michael Champion
XML, Web Services, and the Data Revolution presents a... | | Introduction to Cryptography: Principles and ApplicationsDue to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.
In the first part, this book covers the key concepts of cryptography on an... |
|
We See It All: Liberty and Justice in an Age of Perpetual Surveillance
This investigation into the legal, political, and moral issues surrounding how the police and justice system use surveillance technology asks the question: what are citizens of a free country willing to tolerate in the name of public safety?
As we rethink the scope of police power, Jon Fasman’s chilling examination ... | | ASP.NET 3.5 Social NetworkingSocial Networking is all about developing connections or ties between friends and associates. While people have always networked with one another the Internet has allowed us to network with people all over the world easily. Any interest or cause can support its own social network, where fans and followers can meet, chat, and share their views. But... | | Hiding in Plain Sight: Steganography and the Art of Covert CommunicationYour hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography
These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted... |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |