Modern Cryptography: Theory and Practice Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents... Ubuntu: The Complete Reference (Complete Reference Series)
The Definitive Guide to Ubuntu--Covers Ubuntu 8.04 LTS
Maximize the powerful features of Ubuntu with expert guidance, tips, and techniques from bestselling Linux author Richard Petersen. Packed with clear explanations and detailed examples, this comprehensive volume shows you how to get off the ground with Ubuntu, set up...
Learning Microsoft Windows Server 2012 Dynamic Access Control
When you know Dynamic Access Control, you know how to take command of your organization's data for security and control. This book is a practical tutorial that will make you proficient in the main functions and extensions.
Understand the advantages of using Dynamic Access Control and how it...
|Result Page: 4 3 2 1 |