 |
|
 CISSP For Dummies (Computer/Tech)Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying... |  |  Java Security SolutionsYour complete guide to the what, why, where, and how of Java Security
In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,... |  |  Practical .NET 2.0 Networking ProjectsPractical .NET 2.0 Networking Projects demonstrates some of the key networking technologies that are being made easily accessible through .NET Framework 2.0. It discusses communication between wired machines and between networks and mobile devices. The book teaches you about the technologies by walking you through sample projects in a... |
|
 Taxes 2007 For DummiesTax season doesn’t just have to be about paying Uncle Sam his due. Sure, giving up your hard-earned dollars hurts, but you can turn lemons into lemonade by turning knowledge into immediate and long-term tax savings. What’s more, wising up about your tax situation can only increase your financial savvy and bolster your future... |  |  Linux Appliance Design: A Hands-On Guide to Building Linux AppliancesLinux appliances are computers that serve a single, well-defined purpose. Modern appliances are complex machines, with processors, operating systems, and application software. For example, the Tivo is essentially a Linux-based computer with a single purpose: recording television. While there are books that tell readers how to run Linux on embedded... |  |  An Introduction to Distributed Algorithms"Barbosa makes the otherwise difficult subject of distributed algorithms very enjoyable and attractive to both students and researchers. The leading intuitive discussion of each algorithm is so very well organized and clearly written that a reader can, without the slightest effort, have a clear picture of it. An ideal textbook for an... |
|
|
 Knowledge Mining: Proceedings of the NEMIS 2004 Final ConferenceThis book contains the papers presented during the 3rd International Workshop on Text Mining and its Applications held in Athens, Greece. This workshop is the final event of the activities of a network of excellence in the area of text mining and its applications. Knowledge Mining includes contributions in the areas of: Document processing,... |  |  Computer Security and CryptographyGain the skills and knowledge needed to create effective data security systems
This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect... |  |  IT Auditing: Using Controls to Protect Information AssetsPlan for and manage an effective IT audit program using the in-depth information contained in this comprehensive resource. Written by experienced IT audit and security professionals, IT Auditing: Using Controls to Protect Information Assets covers the latest auditing tools alongside real-world examples, ready-to-use checklists, and... |
|
Result Page: 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 |