 |
|
 Security Strategy: From Requirements to Reality
Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and... |  |  Guide to Networking Essentials, Fourth Edition
This book is intended to serve the needs of individuals and information systems pro- fessionals who are interested in learning more about networking technologies, but who may have little or no background in this subject matter. In the first edition of this book, the materials were originally designed to help individuals prepare for Microsoft... |  |  Professional Issues in Software Engineering
It is widely recognized that a professional engineer needs to be aware of a range of issues
much wider than the mere technical knowledge necessary to practice the chosen
engineering discipline. The Engineering Council, for example, requires that the formation
of a professional engineer should include, amongst other things,
... |
|
 CCNP Security Secure 642-637 Official Cert Guide
Trust the best selling Official Cert Guide series from Cisco Press to help you learn, prepare, and practice for exam success. They are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam.
... |  |  Introduction to Cryptography
Cryptography is a key technology in electronic security systems.
Modern cryptograpic techniques have many uses, such as to digitally
sign documents, for access control, to implement electronic money,
and for copyright protection. Because of these important uses it is
necessary that users be able to estimate the efficiency and security... |  |  Introduction to Cryptography (Undergraduate Texts in Mathematics)
Cryptography is a key technology in electronic security systems.
Modern cryptograpic techniques have many uses, such as to digitally
sign documents, for access control, to implement electronic money,
and for copyright protection. Because of these important uses it is
necessary that users be able to estimate the efficiency and security... |
|
 Multimedia over IP and Wireless Networks: Compression, Networking, and Systems
This all-inclusive, expertly structured contributed volume will serve as an indispensable guide for professionals or researchers working in areas like networking, communications, data compression, multimedia processing, streaming architectures, and computer graphics. Beginning with a concise overview of the fundamental principles and... |  |  Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and
Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli,
Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed
introduction of these four papers, please refer to the Preface written by
the organizers... |  |  Encyclopedia of Cryptography and Security
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all... |
|
 Open Source GIS: A GRASS GIS Approach
Over the past decade, Geographical Information Systems (GIS) have evolved
from a highly specialized niche to a technology that affects nearly every aspect
of our lives, from finding driving directions to managing natural disasters.
While just a few years ago the use of GIS was restricted to a group of
researchers, planners and... |  |  |  |  Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole
new level. Whether you’re in the IT department, a systems integrator, a business
leader, or an end user, Fusion Applications has more of what you need, less of
what you don’t, and some of what you didn’t even think possible.
... |
|
| Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |