 |
|
 Brute Force: Cracking the Data Encryption StandardIn the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved... |  |  Juniper(r) Networks Secure Access SSL VPN Configuration GuideJuniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for... |  |  |
|
 Perl Scripting for IT SecurityThis book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely... |  |  InfoSecurity 2008 Threat AnalysisAn all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess... |  |  Open Source Web Site Construction KitGives readers a comprehensive survey of the best tools for building and maintaining Web sites. Author takes the reader through the process of thinking through and then building an open source Web site. Softcover.
This book gives readers a comprehensive survey of the best tools for building and maintaining Web sites. In a... |
|
|
 Red Hat Fedora Linux 3 For DummiesGet online with broadband DSL and build Web pages
Install Fedora Core 3, use OpenOffice.org, play CDs, and set up a firewall
The penguin is back, and better than ever! And this friendly guide will help you install and configure the new edition of Fedora Core so you can use exciting features like the SELinux infrastructure, which... |  |  JRuby CookbookIf you're interested in JRuby, you probably don't need a turorial on Ruby, Rails, or Java -- you just need to know how to get things done. This Cookbook offers practical solutions for using the Java implementation of the Ruby language, with targeted recipes for deploying Rails web applications on Java servers, integrating JRuby code with Java... |  |  Computational PhysicsComputational physics book that emphasizes the physics that can be done with numerical/computational methods rather than just the methods themselves. Uses True Basic. (Representative programs on WWW). Praised for its coverage of many interesting topics in pure and applied physics.
From the Publisher ... |
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 |