Home | Amazing | Today | Tags | Publishers | Years | Search 
Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
Wireless Internet Security: Architecture and Protocols
Wireless Internet Security: Architecture and Protocols
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for...
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
Advances in Ubiquitous Computing: Future Paradigms and Directions
Advances in Ubiquitous Computing: Future Paradigms and Directions
The development and availability of new computing and communication devices, and the increased connectivity between these devices, thanks to wired and wireless networks, are enabling new opportunities for people to perform their operations anywhere and anytime. This technological expansion has developed a multitude of challenges that demand further...
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
The user's guide to best practices in improving and enhancing security in a SAP landscape.

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and
...
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
Blogging For Dummies, Second Edition (Computer/Tech)
Blogging For Dummies, Second Edition (Computer/Tech)
Everybody’s doing it! And while that logic never got far with your mother, it’s a fine reason to start blogging, especially if you have a business to build or a cause to promote. Well-run blogs do more than offer an outlet for your thoughts. They’ve actually influenced everything from a company’s image to the outcome of a...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

ASP.NET 3.5 Social Networking
ASP.NET 3.5 Social Networking
Social Networking is all about developing connections or ties between friends and associates. While people have always networked with one another the Internet has allowed us to network with people all over the world easily. Any interest or cause can support its own social network, where fans and followers can meet, chat, and share their views. But...
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy