Home | Amazing | Today | Tags | Publishers | Years | Search 
Building A Global Information Assurance Program
Building A Global Information Assurance Program
Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are...
Red Hat Fedora Linux 3 For Dummies
Red Hat Fedora Linux 3 For Dummies
Get online with broadband DSL and build Web pages

Install Fedora Core 3, use OpenOffice.org, play CDs, and set up a firewall

The penguin is back, and better than ever! And this friendly guide will help you install and configure the new edition of Fedora Core so you can use exciting features like the SELinux infrastructure, which...

Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Two Bits: The Cultural Significance of Free Software
Two Bits: The Cultural Significance of Free Software
In "Two Bits", Christopher M. Kelty investigates the history and cultural significance of Free Software, revealing the people and practices that have transformed not only software, but also music, film, science, and education. Free Software is a set of practices devoted to the collaborative creation of software source code that is made...
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Mobile And Wireless Networks Security: Proceedings of the MWNS 2008 Workshop Singapore 9 April 2008
Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of "always on" access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications...
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)

"This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the...

Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Principles of Embedded Networked Systems Design
Principles of Embedded Networked Systems Design
"...this volume represents a real mine of information...anyone working in the field would benefit from owning a copy." IEEE Communications Engineer

Embedded network systems (ENS) provide a set of technologies that can link the physical world to large-scale networks in applications, such as monitoring of borders,
...
Optical Networks and Technologies: IFIP TC6 / WG6.10 First Optical Networks & Technologies Conference (OpNeTec), October 18-20, 2004, Pisa, Italy
Optical Networks and Technologies: IFIP TC6 / WG6.10 First Optical Networks & Technologies Conference (OpNeTec), October 18-20, 2004, Pisa, Italy
This book is of interest to both academic and professional researchers working in the field of optical fiber communication. The focus is on engineering networks exploiting advanced optical technologies. Originally presented at OpNeTec 2004, the chapters cover optical network systems, transmission, and amplification; theoretical aspects; system...
Beginning Ubuntu LTS Server Administration: From Novice to Professional, Second Edition
Beginning Ubuntu LTS Server Administration: From Novice to Professional, Second Edition
Beginning Ubuntu LTS Server Administration, Second Edition is the touchstone companion book for anyone implementing Ubuntu LTS Server. Author Sander van Vugt introduces the most recent server edition of Ubuntu Linux, the most popular Linux distribution, to power users, system administrators, and programmers and...
MCSE: Windows Directory Services Administration Study Guide (with CD-ROM)
MCSE: Windows Directory Services Administration Study Guide (with CD-ROM)

Here’s the book you need to prepare for Exam 70-217, Implementing and Administering a Microsoft Windows 2000 Directory Services Infrastructure. This study guide provides:

  • In-depth coverage of every exam objective--all the information you need
  • Practical...
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the...
Result Page: 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy