|
|
|
|
|
|
Poverty in GuatemalaPoverty in Guatemala is part of the World Bank Country Study series. These reports are published with the approval of the subject government to communicate the results of the Bank's work on the economic and related conditions of member countries to governments and to the development community. This report is part of a collaborative multi-year... | | Hacker Linux UncoveredConcentrating on Linux installation, tuning, and administration, this guide to protecting systems from security attacks demonstrates how to install Linux so that it is tuned for the highest security and best performance, how to scan the network and encrypt the traffic for securing all private traffics in a public network, and how to monitor and log... | | |
|
Protect Your Information With Intrusion Detection (Power)Protect Your Information with Intrusion Detection contains a detailed overview of the new technology in information protection--intrusion detection. This is a comprehensive handbook introducing the reader to the problem of intrusion detection, exploring the main concepts and principals of intrusion detection technology, and giving an... | | Autonomic Computing: Concepts, Infrastructure, and ApplicationsAdvances in networking and computing technologies, and software tools have resulted in an explosive growth in applications and information services that influence all aspects of our life. These sophisticated applications and services are complex, heterogeneous, and dynamic. Further, the underlying information infrastructure (e.g., the Internet)... | | E-Commerce: A Control and Security GuideOnce scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and... |
|
|
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |