Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...
Deploying IPv6 Networks
An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.
Learn about IPv6 services and the relevant IPv6 features that make them possible
Plan, deploy, and manage IPv6 services at...
Peer to Peer Computing: The Evolution of a Disruptive Technology Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to...
|Result Page: 25 24 23 22 21 20 19 18 17 16 |