Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

RTP: Audio and Video for the Internet
RTP: Audio and Video for the Internet

The Real-time Transport Protocol (RTP) provides a framework for delivery of audio and video across IP networks and unprecedented quality and reliability. In RTP: Audio and Video for the Internet, Colin Perkins, a leader of the RTP standardization process in the IETF, offers readers detailed...

Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition

This newly revised edition of the Artech House bestseller offers the most up-to-date comprehensive analysis of the current trends in WWW security available, with brand new chapters on authentication and authorization infrastructures, server-side security, and risk management. Practitioners will also find coverage of entirely new topics such as...

Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto

The Privacy Engineer's Manifesto: Getting...

Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results
Practical Web Traffic Analysis: Standards, Privacy, Techniques, and Results

Once you've got a web site up and running it is all too easy to sit back and relax. But how do you know you did a good job? How can you improve the site you have based on real user behaviour? Without getting feedback from your users, how will you find out how it's being used? Web traffic analysis allows you to gain some insight into...

Advanced CISSP Prep Guide: Exam Q & A
Advanced CISSP Prep Guide: Exam Q & A

Get ready to pass the CISSP exam and earn your certification with this advanced test guide

Used alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the help of more than 300 advanced questions and detailed answers,...

Digital Rights Management: Protecting and Monetizing Content (NAB Executive Technology Briefings)
Digital Rights Management: Protecting and Monetizing Content (NAB Executive Technology Briefings)
"The author, who specialises in digital and interactive media, sets out the arguments with a view to readers being able to make informed decisions on the issues before them." -Book Shelf

Digital rights management (DRM) is a type of server software developed to enable secure distribution - and perhaps more
...
Protecting Privacy in Video Surveillance
Protecting Privacy in Video Surveillance
Protecting Privacy in Video Surveillance offers the state of the art from leading researchers and experts in the field. This broad ranging volume discusses the topic from various technical points of view and also examines surveillance from a societal perspective.

A comprehensive introduction carefully guides the reader through the...

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

The Handbook of Information and Computer Ethics
The Handbook of Information and Computer Ethics
This handbook provides an accessible overview of the most important issues in information and computer ethics. It covers: foundational issues and methodological frameworks; theoretical issues affecting property, privacy, anonymity, and security; professional issues and the information-related professions; responsibility issues and risk assessment;...
Nokia Firewall, VPN, and IPSO Configuration Guide
Nokia Firewall, VPN, and IPSO Configuration Guide
The Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its
...
unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy