Home | Amazing | Today | Tags | Publishers | Years | Search 
Multimedia Security Technologies for Digital Rights Management
Multimedia Security Technologies for Digital Rights Management
A timely reference in the innovative and cutting-edge field of multimedia security!

Digital Rights Management (DRM) defines a set of tools that manage the secured use of digital media content found on static and mobile electronic devices, ranging from personal computers and PDAs to digital video recorders and MP3
...
Data Networks, IP and the Internet: Protocols, Design and Operation
Data Networks, IP and the Internet: Protocols, Design and Operation
Modern data networks are all based on the Internet or on IP (Internet Protocol). But many people remain confused by multiprotocol networks. How do all the protocols fit together? How do I build a network? What do all the components do? What sort of problems should I expect?

Data Networks, IP and the Internet is intended not only for...

Network Security Hacks: Tips & Tools for Protecting Your Privacy
Network Security Hacks: Tips & Tools for Protecting Your Privacy

In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The second edition offers both new and...

Linux Kernels Internals (2nd Edition)
Linux Kernels Internals (2nd Edition)

Since the introduction of Linix version 1.2 in March 1995, a worldwide community has evolved from programmers who were attracted by the reliability and flexibility of this completely free operating system. Now at version 2.0, Linux is no longer simply the operating system of choice for hackers, but is being successfully employed in commercial...

Windows 2000 Active Directory
Windows 2000 Active Directory
Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. If you are a...
Linux Application Development (2nd Edition)
Linux Application Development (2nd Edition)

"The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it."
--Greg Kroah-Hartman, Linux kernel programmer

Develop Software that...

Policy Routing Using Linux
Policy Routing Using Linux
Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently...
Internet & Intranet Security
Internet & Intranet Security

This extensively revised, new edition of the 1998 Artech House classic, Internet and Intranet Security, offers you an up-to-date and comprehensive understanding of the technologies that are available to secure TCP/IP-based networks, such as corporate intranets or the Internet, and their associated applications. It addresses firewall...

Wireless Communications: Principles and Practice (2nd Edition)
Wireless Communications: Principles and Practice (2nd Edition)

The indispensable guide to wireless communications—now fully revised and updated!

Wireless Communications: Principles and Practice, Second Edition is the definitive modern text for wireless communications technology and system design. Building on his classic first edition, Theodore S. Rappaport covers the fundamental...

How To Do Everything with Your Pocket PC, 3rd Edition
How To Do Everything with Your Pocket PC, 3rd Edition

Make your Pocket PC your own personal information appliance. This easy-to-follow guide will teach you everyday essentials such as managing appointments, keeping addresses, and making task lists. It shows you in a clear, step-by-step format, how to retrieve your e-mail and surf the Web, write and format letters, balance your checkbook, make voice...

Mac OS X Tiger in a Snap (Sams Teach Yourself)
Mac OS X Tiger in a Snap (Sams Teach Yourself)
A computer is a big investment, but the time you spend to learn your way around it shouldn't be. Mac OS X Tiger In a Snap is designed specifically for you and the millions of other people who don't have the time to devote to learning the Mac operating system inside and out before you begin using it. The modular format of Mac OS X Tiger In a...
Apple Training Series: Mac OS X v10.4 System Administration Reference, Volume 2
Apple Training Series: Mac OS X v10.4 System Administration Reference, Volume 2

Focusing specifically on Account Management and Deploying Mac OS X Server, this comprehensive reference provides in-depth information on Mac OS X Server's technical architecture. System administrators, IT professionals, and Mac enthusiasts will learn the details of how to deploy Mac OS X Server within a multiplatform,...

Result Page: 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy