|
|
|
|
|
|
IPSec VPN DesignMaster IPSec-based Virtual Private Networks with guidance from the Cisco Systems® VPN Solutions group
-
Understand how IPSec VPNs are designed, built, and administered
-
Improve VPN performance through enabling of modern VPN services... | | Computer Security in the 21st CenturyComputer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.
Highlights include... | | |
|
Mobile Database Systems (Wiley Series on Parallel and Distributed Computing)A breakthrough sourcebook to the challenges and solutions for mobile database systems
This text enables readers to effectively manage mobile database systems (MDS) and data dissemination via wireless channels. The author explores the mobile communication platform and analyzes its use in the development of a distributed database management... | | Handbook of Wireless Local Area Networks: Applications, Technology, Security, and StandardsConsisting of 25 articles contributed by expert authors from around the world, this handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols. It then delves further into WLAN technology, covering space-time processing, WLAN and cellular convergence, and a... | | Content Management Systems (Tools of the Trade)This book will guide you through the process of arriving at a content management solution, including the background knowledge you need to know, how to go about getting a solution, implementing the solution, and migrating existing content to it.
This book includes:
- Three activities of content management: Asset...
|
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |