|
|
|
|
|
| | | | Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... |
|
|
From Alien To The Matrix: Reading Science Fiction Film ‘I really enjoyed From Alien to The Matrix, it seemed like an incredibly necessary book – arming the geeks with tools to read films for the DVD generation – and possibly regeneration. Clear, simple text, in which an understanding of slash fiction is as important to the... | | Packet Filtering: Catching the Cool PacketsThis book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than... | | Adobe Scripting: Your Visual Blueprint to Scripting in Photoshop and IllustratorCombining clear, step-by-step screen shots with minimal text, our five Visual series are the ultimate resources for visual learners, who represent up to forty percent of your customers. Teach Yourself VISUALLY guides help computer users get up to speed on a wide range of office productivity, graphics, and Web design software. Offering... |
|
|
Result Page: 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 |