Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Security & Commerce (O'Reilly Nutshell)
Web Security & Commerce (O'Reilly Nutshell)
Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of
personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?

Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks
...
Microsoft Enterprise Library 5.0
Microsoft Enterprise Library 5.0

Microsoft Enterprise Library is a collection of reusable software components (also known as Application Blocks) that are designed to assist developers with common enterprise development challenges. Before using an Application block, you should have a good understanding of your application requirements and of the scenarios that the Application...

Java Cryptography (Java Series)
Java Cryptography (Java Series)
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application
programmer's arsenal. Cryptography provides three services that are crucial in secure programming.
These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates,
which prove identity
...
Machinima: The Art and Practice of Virtual Filmmaking
Machinima: The Art and Practice of Virtual Filmmaking

Unlike traditional animation techniques that use specialized 3D animation software, machinima--a term derived from the words "machine" and "cinema"--records the action in real-time interactive 3D environments, such as those found in video games, to create a cinematic production. No longer solely the province of hard-core...

LGBTI Asylum Seekers and Refugees from a Legal and Political Perspective: Persecution, Asylum and Integration
LGBTI Asylum Seekers and Refugees from a Legal and Political Perspective: Persecution, Asylum and Integration
This book addresses the ‘three moments’ in lesbian, gay, bisexual, transgender and intersex (LGBTI) asylum seekers’ and refugees’ efforts to secure protection: The reasons for their flight, the Refugee Status Determination process, and their integration into the host community once they are recognized refugee...
Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management...

The Art of Rails (Programmer to Programmer)
The Art of Rails (Programmer to Programmer)
There is a certain state of mind, a certain transient condition that arises, where everything seems to resonate and effort becomes effortless. Athletes call it being in the zone, some others call it flow. Flow has nothing to do with triumph or accomplishment; it isn’t the product of your labors. Flow is the merging of a watchmaker and his...
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)
Face Biometrics for Personal Identification: Multi-Sensory Multi-Modal Systems (Signals and Communication Technology)

From time immemorial, the security realm and personal identification task had shown progress by employing technological means like secret knowledge as passwords and Personal Identification Numbers, and by using personal possessions as identity cards and Radio Frequency Identification chips. As opposed to these means which are...

Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting,...

Open Source Identity Management Patterns and Practices Using OpenAM 10.x
Open Source Identity Management Patterns and Practices Using OpenAM 10.x

An intuitive guide to learning OpenAM access management capabilities for web and application servers

Overview

  • Learn patterns, practices, and the terminology of Identity Management
  • Learn how to install OpenAM 10.x
  • Protect web and application servers using policy agents
  • ...
Project Management with dotProject: Implement, Configure, Customize, and Maintain your DotProject Installation
Project Management with dotProject: Implement, Configure, Customize, and Maintain your DotProject Installation
This is a comprehensive beginner's book on dotProject and deals with the basics of implementing and configuring dotProject. It is a simple guide to setting up an internal project management solution as quickly as possible, and at zero cost. All the examples in this book are fully practical and will help you to get things done with dotProject. To...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy