Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Firewall Fundamentals
Firewall Fundamentals

The essential guide to understanding and using firewalls to protect personal computers and your network

  • An easy-to-read introduction to the most commonly deployed network security device

  • Understand the threats firewalls are designed to...

Mycotoxins in Food: Detection and Control
Mycotoxins in Food: Detection and Control
Recent research has increased awareness of chemical residues and natural contaminants in food. At the same time, consumer concerns about food safety have also grown. At a national and international level this has resulted in more stringent imposition of new, legislative limits for a range of mycotoxins which can contaminate food...
Cathodic Protection for Reinforced Concrete Structures
Cathodic Protection for Reinforced Concrete Structures
The use of steel in concrete has increased massively in the last century, and it is now one of the most commonly used building materials on earth (second to water in usage by mankind). The biggest durability problem with structures of this material is corrosion of the steel reinforcement. The cause of this...
Guide to Networking Essentials, Fourth Edition
Guide to Networking Essentials, Fourth Edition

This book is intended to serve the needs of individuals and information systems pro- fessionals who are interested in learning more about networking technologies, but who may have little or no background in this subject matter. In the first edition of this book, the materials were originally designed to help individuals prepare for Microsoft...

Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)
Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system’s security infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003...

Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.

The 13 revised full papers presented were carefully reviewed and selected for inclusion in the book. Among the topics addressed...

Molecular Catalysts for Energy Conversion (Springer Series in Materials Science)
Molecular Catalysts for Energy Conversion (Springer Series in Materials Science)
The role of molecular catalysts for energy conversion grows more and more important since these have wide applications in fuel cells, electrochemical solar cells, artificial photo-syntheses, and so on. A firm strategy for their design and application is awaited to cope with the expeditious solution of the latest energy and environment issues. This...
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student...
Transactions on Data Hiding and Multimedia Security VI
Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed introduction of these four papers, please refer to the Preface written by the organizers...
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions

The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations...

Windows Vista in a Nutshell: A Desktop Quick Reference
Windows Vista in a Nutshell: A Desktop Quick Reference

This unique reference thoroughly documents every important setting and feature in Microsoft's new operating system, with alphabetical listings for hundreds of commands, windows, menus, listboxes, buttons, scrollbars and other elements of Windows Vista. With this book's simple organization, you'll easily find any setting,...

Oracle Application Express 3.2: The Essentials and More
Oracle Application Express 3.2: The Essentials and More

Developing data-centric web applications can be a real challenge as it is a multi-disciplinary process. There are many technologies involved in the client side (HTML, CSS, JavaScript, and so on); the interaction with the database, on the server side; the typeless nature of the web environment; and above all, the need to put it all together....

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy