 |
|
 Writing Secure Code for Windows Vista (Pro - Step By Step Developer)Get the definitive guide to writing secure code and developing more-secure applications for Windows Vista--straight from the experts. Security is one of the greatest enhancements in Windows Vista, and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop... |  |  Biometrics: Identity Verification in a Networked WorldAn in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment
No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce... |  |  Digital Crime And Forensic Science in Cyberspaceitself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has... |
|
 CCIE Security Exam Certification Guide (CCIE Self-Study)Official self-study test preparation guide for the CCIE Security written exam
Review all CCIE Security written exam topics, including:
- Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
- DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
|  |  Pro PayPal E-Commerce (Expert's Voice)Pro PayPal E-Commerce contains the most comprehensive collection of information on the latest PayPal technologies available. It takes the approach of PayPal as a digital money platform, and shows how it's a dynamic service that offers far more than just payment processing.
With its breadth of technologies and APIs, the PayPal platform... |  |  Formal Correctness of Security Protocols (Information Security and Cryptography)Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.
The author investigates proofs of correctness of realistic security protocols in... |
|
 |  |  |  |  Creative Evolutionary Systems (With CD-ROM)This volume shows the current state of the art, and the science, of evolutionary creativity. It shows what can--and equally important, what can't--be done at the turn of the new millennium. What will have been achieved by the turn of the next one is anyone's guess. Meanwhile, it's intriguing, it's instructive, it's difficult, and it's fun!... |
|
 Advanced Techniques in Knowledge Discovery and Data MiningData mining and knowledge discovery (DMKD) is a rapidly expanding field in computer science. It has become very important because of an increased demand for methodologies and tools that can help the analysis and understanding of huge amounts of data generated on a daily basis by institutions like hospitals, research laboratories, banks, insurance... |  |  |  |  Economics of Identity Theft: Avoidance, Causes and Possible CuresToday, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information.... |
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |