Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Security Basics (Networking)
Web Security Basics (Networking)

In our business world, Web sites have become a powerful marketplace that can capsize a company when attacked by a virus or hacker. Server security is critical to the survival of e-business. While the Internet has improved the way business is conducted, it has also added new rules to play by. With this book, you can take the necessary steps today...

Date on Database: Writings 2000-2006
Date on Database: Writings 2000-2006

Date on Database: Writings 2000&emdash;2006 captures some of the freshest thinking from widely known and respected relational database pioneer C. J. Date. Known for his tenacious defense of relational theory in its purest form, Date tackles many topics that are important to database professionals, including the difference between...

Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management...

A Technical Guide to IPSec Virtual Private Networks
A Technical Guide to IPSec Virtual Private Networks

This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...

Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

FileMaker Pro 10 Bible
FileMaker Pro 10 Bible

FileMaker Pro 10 Bible provides information that grows with you no matter what your level when you start. Topics range from the general (how databases fit into real life and your business needs; comparisons with other database development tools; a broad discussion of integration with existing systems and software) through the...

IT Audit, Control, and Security (Wiley Corporate F&A)
IT Audit, Control, and Security (Wiley Corporate F&A)
WELCOME TO THE WORLD of IT Audit, Control, and Security. Much has changed in information technology (IT) auditing since we published our first edition of this book when we were then called Computer Auditors. Back in those days, traditional mainframe or legacy computer systems were still common, we had difficulty envisioning...
Security in Distributed, Grid, Mobile, and Pervasive Computing
Security in Distributed, Grid, Mobile, and Pervasive Computing
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee...
Applied Mathematics for Database Professionals (Expert's Voice)
Applied Mathematics for Database Professionals (Expert's Voice)
Relational databases hold data, right? They indeed do, but to think of a database as nothing more than a container for data is to miss out on the profound power that underlies relational technology. A far more powerful way of thinking lies in relational technology's foundation in the mathematical disciplines of logic and set theory.

Databases...

The New Workplace: A Guide to the Human Impact of Modern Working Practices
The New Workplace: A Guide to the Human Impact of Modern Working Practices

We are all increasingly familiar with modern business terms such as total quality management, just-in-time production, e-business, lean manufacturing and teleworking. But what really lies behind these terms and what effect do these and other new practices have on productivity and performance and, crucially, what is their social and psychological...

The Customer Trap: How to Avoid the Biggest Mistake in Business
The Customer Trap: How to Avoid the Biggest Mistake in Business

American business is dysfunctional. Companies of all sizes follow the mistaken belief that their products and services are best sold through organizations with pervasive market reach. Far too many business leaders fail to realize - until it is too late - that the relentless pursuit of volume at all cost is not the key to long-term profits and...

Bodily Integrity and the Politics of Circumcision: Culture, Controversy, and Change
Bodily Integrity and the Politics of Circumcision: Culture, Controversy, and Change

Every year 13.3 millions boys and 2 million girls are subjected to circumcision, the involuntary removal of part or all of their external sex organs.

Bodily Integrity and the Politics of Circumcision illuminates the vulnerability of human society to medical, economic, and historical pressures. It provides a much-needed, thoughtful,...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy