|
|
|
|
|
A Technical Guide to IPSec Virtual Private NetworksThis book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison... | | Java Security SolutionsYour complete guide to the what, why, where, and how of Java Security
In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,... | | FileMaker Pro 10 Bible
FileMaker Pro 10 Bible provides information that grows with you no matter what your level when you start. Topics range from the general (how databases fit into real life and your business needs; comparisons with other database development tools; a broad discussion of integration with existing systems and software) through the... |
|
IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has
changed in information technology (IT) auditing since we published our
first edition of this book when we were then called Computer Auditors. Back
in those days, traditional mainframe or legacy computer systems were still common, we
had difficulty envisioning... | | Security in Distributed, Grid, Mobile, and Pervasive ComputingDespite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee... | | Applied Mathematics for Database Professionals (Expert's Voice)Relational databases hold data, right? They indeed do, but to think of a database as nothing more than a container for data is to miss out on the profound power that underlies relational technology. A far more powerful way of thinking lies in relational technology's foundation in the mathematical disciplines of logic and set theory.
Databases... |
|
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |