Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
PGP: Pretty Good Privacy
PGP: Pretty Good Privacy

Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not...

Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i

"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC

"This...

Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility
Corporate Ethics: How to Update or Develop Your Ethics Code so That it is in Compliance With the New Laws of Corporate Responsibility

Never has ethical business conduct received as much attention and focus as it does at present, in the wake of the far-reaching financial and societal effects of the dramatic collapses that have thundered through Corporate America. Whether your company is private, publicly-held, works with the government – either contractually or through...

RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Microsoft  SharePoint  Products and Technologies Administrator's Pocket Consultant
Microsoft SharePoint Products and Technologies Administrator's Pocket Consultant

Get fast answers for the day-to-day administration of Windows SharePoint Services 3.0 and Office SharePoint Server 2007. Zero in on core support and maintenance tasks using quick-reference tables, instructions, and lists. You’ll get the precise information you need to get the job done-whether you’re at your desk or in the field!

...
Major Donors: Finding Big Gifts in Your Database and Online
Major Donors: Finding Big Gifts in Your Database and Online

A winning approach to developing international fundraising strategies

Philanthropy is in a renewed golden age. People want to help, to make a difference, to ensure that the things they value will flourish. In order to capitalize on potential prospects, many nonprofit professionals focus solely on the research of, or communication with,...

802.11 Security
802.11 Security

802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent...

PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid
"...The World's first user-friendly book on email privacy...unless you're a cryptographer, or never use email, you should read this book." —Len Sassaman, CodeCon Founder

"Today, most email is sent like a postcard. We all should want to put our mail back into secure envelopes again. PGP and GPG are two of the leading tools...

Network Security: A Beginner's Guide
Network Security: A Beginner's Guide

Learn network security basics using this practical guide

Create a successful security program--even if you're new to the field of network security--using this practical guidebook. You can now get the technical background you need and have access to the best and most up-to-date security practices--from one resource. You'll learn how to...

Privacy and Big Data
Privacy and Big Data

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once...

Web Site Privacy with P3P
Web Site Privacy with P3P
Introducing the long-awaited first step to personal privacy on the Web!

Privacy on the Internet is a very complicated–and delicate–subject. It is about making sure that sites are honest with the people using their services, and providing the end user with the choice of whether or not to share information with the original server....

Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
Trustworthy Computing: Analytical and Quantitative Engineering Evaluation
"The book itself is a commendable achievement, and it deals with the security and software reliability theory in an integrated fashion with emphasis on practical applications to software engineering and information technology. It is an excellent and unique book and definitely a seminal contribution and first of its kind."

...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy