 |
|
 Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services.... |  |  Get Ready for OpenIDThis is the first book written on the OpenID system and it provides comprehensive information to beginners and mid level programmers of OpenID. The book includes topics like: o Introduction to identity management o Creating OpenID identities o Using OpenID to login to web sites o Understanding the OpenID protocol o Structure of OpenID messages o... |  |  Practical Internet SecurityAs organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external... |
|
 Role-Based Access Control, Second EditionRole-based access control (RBAC) is a security mechanism that has gained wide acceptance in the field because it can greatly lower the cost and complexity of securing large networked and Web-based systems. Written by leading experts, this newly revised edition of the Artech House bestseller, Role-Based Access Control, offers practitioners... |  |  Security of e-Systems and Computer NetworksE-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of... |  |  |
|
|
 Absolute FreeBSD: The Complete Guide to FreeBSD, 2nd EditionFreeBSD—the powerful, flexible, and free Unix-like operating system—is the preferred server for many enterprises. But it can be even trickier to use than either Unix or Linux, and harder still to master.
Absolute FreeBSD, 2nd Edition is your complete guide to FreeBSD, written by FreeBSD committer Michael W. Lucas. Lucas... |  |  A Practical Guide to Trusted ComputingUse Trusted Computing to Make PCs Safer, More Secure, and More Reliable
Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes... |  |  Wireless Network Security (Signals and Communication Technology)Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the... |
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 |