|
|
|
|
|
Java Security SolutionsYour complete guide to the what, why, where, and how of Java Security
In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,... | | Encyclopedia of Cryptology
Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that... | | Death, Judgment, Heaven, and Hell: Sayings of the Fathers of the Church
Catholic University of America Press is proud to present the second volume in its new Sayings of the Fathers of the Church Series. Featuring a wide range of scholars compiling material from our acclaimed Fathers of the Church volumes, each title will be devoted to a few specific areas of theology. The inaugural volume covered The ... |
|
Introduction to Cryptography with Java AppletsCryptography is the art of secret writing. It involves transforming information into apparently unintelligible garbage so that unwanted eyes will be unable to comprehend it. This transformation, however, must be done so that it is reversible, so that individuals intended to view the information may do so. This is the traditional use of... | | How Cool Stuff Works
Communication systems have existed for thousands of years. A postal system, with relays of riders to deliver messages, was used in Ancient Persia (now Iran) as long ago as the 6th century BC. Until the 1800s, sending post in this way was the only method of long-distance communication. The time it took for a message to be received depended on... | | Pro MSMQ: Microsoft Message Queue Programming
This will be the only book on the market with in-depth coverage of using Message Queuing from .NET code – it won't just be the number one in its category; it will be the only book in its category.
* The only book targeted at developers with in-depth coverage of MSMQ 3.0 and MSMQ triggers
* The only MSMQ book... |
|
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |