Check Point Next Generation Security Administration Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check... Cryptography for Internet & Database Applications Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
Amazon S3 Cookbook
Over 30 hands-on recipes that will get you up and running with Amazon Simple Storage Service (S3) efficiently
About This Book
Learn how to store, manage, and access your data with AWS SDKs
Study the Amazon S3 pricing model and learn how to calculate costs by simulating practical...
Multiagent System Technologies: Second German Conference, MATES 2004, Erfurt, Germany, September 29-30, 2004, Proceedings This book constitutes the refereed proceedings of the Second German Conference on Multiagent Systems Technologies, MATES 2004, held in Erfurt, Germany, in September 2004.
The 22 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on...
Drools JBoss Rules 5.0 Developer's Guide Business rules can help your business by providing a level of agility and flexibility. As a developer, you will be largely responsible for implementing these business rules effectively, but implementing them systematically can often be difficult due to their complexity. Drools, or JBoss Rules, makes the process of implementing these rules quicker...
|Result Page: 49 48 47 46 45 44 43 42 41 40 |