Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Buying a Computer for Dummies, 2005 Edition
Buying a Computer for Dummies, 2005 Edition
CPU, Ghz, Mhz, DIMMS, RAM, ROM, AGP, ISA, PCI, USB, CRT, LCD, NIC, CCD, CIS, DP, Kbps. What do all of these acronyms mean?

Are you baffled by computer technology and technology? Intimidated by computer salespeople who grimace or grin when you say “gizmo?” Buying a Computer For Dummies 2005 Edition gives you the ABCs of...

Energy Efficient Servers: Blueprints for Data Center Optimization
Energy Efficient Servers: Blueprints for Data Center Optimization

Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other...

Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

PCI-X System Architecture
PCI-X System Architecture

The PCI-X bus will start appearing in advanced PCs within months, delivering breakthrough performance, transfer rates of up to 1.06 Gb/sec, and backward compatibility with the PCI standard. Now, there's a comprehensive guide to PCI-X, covering everything engineers and developers need to create robust, reliable PCI-X boards and software....

Scene of the Cybercrime, Second Edition
Scene of the Cybercrime, Second Edition

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one...

Jitter, Noise, and Signal Integrity at High-Speed
Jitter, Noise, and Signal Integrity at High-Speed

State-of-the-art JNB and SI Problem-Solving: Theory, Analysis, Methods, and Applications

 

Jitter, noise, and bit error (JNB) and signal integrity (SI) have become today‘s greatest challenges in high-speed digital design. Now, there’s a...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

HyperTransport 3.1 Interconnect Technology
HyperTransport 3.1 Interconnect Technology

HyperTransportTM technology has revolutionized microprocessor core interconnect. It serves as the central interconnect technology for nearly all of AMD s microprocessors as well as for a rich ecosystem of other microprocessors, system controllers, graphics processors, network processors, and communications semiconductors. It is a high-speed,...

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking...

PCI Bus Demystified (With CD-ROM)
PCI Bus Demystified (With CD-ROM)
Doug Abbott is founder and president of Intellimetrix, Inc., a computer hardware design firm in Silver City, New Mexico. He has conducted seminars on PCI bus theory and design for such companies as Intel and Sun Microsystems.

(LLH Technology Publishing) Up-to-the-minute information on the PCI bus, inside and out, from a PCI bus expert.
...
Information Security Fundamentals, Second Edition
Information Security Fundamentals, Second Edition

Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...

unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy