|
|
|
|
|
|
| | Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from
reading your files, and cryptography that will stop major governments from reading your files. This
book is about the latter.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the... | | Prehospital Trauma Care
Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,... |
|
Triumph Forsaken: The Vietnam War, 1954-1965 (v. 1)Drawing on a wealth of new evidence from all sides, Triumph Forsaken overturns most of the historical orthodoxy on the Vietnam War. Through the analysis of international perceptions and power, it shows that South Vietnam was a vital interest of the United States. The book provides many new insights into the overthrow of Ngo Dinh Diem in 1963 and... | | Firewalls 24sevenFor experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.
Written to... | | The Internet and American Business (History of Computing)
The effect of a commercialized Internet on American business, from the boom in e-commerce and adjustments by bricks-and-mortar businesses to file-sharing and community building.
When we think of the Internet, we generally think of Amazon, Google, Hotmail, Napster,
MySpace, and a host of other sites for buying products, searching... |
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |