Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)
Implementing Electronic Card Payment Systems (Artech House Computer Security Series)

Europay, MasterCard, and Visa developed a standard for chip cards, referred to as the EMV, allowing consumers and businesses greater protection against fraud compared with magnetic stripe cards. Implementing Electronic Card Payment Systems provides a comprehensive overview of the EMV chip solution and explains how this technology...

Special Edition Using Macromedia Studio 8
Special Edition Using Macromedia Studio 8

Macromedia Studio 8 users, look no further! Special Edition Using Macromedia Studio MX is the ultimate comprehensive reference book for users of Macromedia's suite of web design and development tools. Updated to include all new features of the new release, you will focus on the integration of the...

Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition

This newly revised edition of the Artech House bestseller offers the most up-to-date comprehensive analysis of the current trends in WWW security available, with brand new chapters on authentication and authorization infrastructures, server-side security, and risk management. Practitioners will also find coverage of entirely new topics such as...

Guide to the Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)
Guide to the Wiring Regulations: 17th Edition IEE Wiring Regulations (BS 7671:2008)

Guide to the Wiring Regulations

17th Edition IEE Wiring Regulations (BS 7671: 2008)

Darrell Locke IEng MIEE ACIBSE, Electrical Contractors' Association, UK

Essential for electrical installers and installation...

Instant Citrix Security How-to
Instant Citrix Security How-to

With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.

"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing...

Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor
Windows Server 2008 R2 Hyper-V: Insiders Guide to Microsoft's Hypervisor

Get the inside scoop on Hyper-V for Windows Server 2008 R2

Virtualization is a top priority for thousands of companies all over the world. Written by an author team that is part of the Windows virtualization group at Microsoft, Windows Server 2008 R2 Hyper-V will walk you through Hyper-V essentials so you can get you up to...

Red Hat Linux 7.2: The Complete Reference, Second Edition
Red Hat Linux 7.2: The Complete Reference, Second Edition

The Most Comprehensive Red Hat Linux Resource Available

Master Red Hat Linux--including version 7.2--using this authoritative reference. Linux guru Richard Petersen provides details on networking, kernel management, Internet servers, system administration, and much more. You'll also get full coverage of Internet clients, office suites,...

The Compromise of Liberal Environmentalism
The Compromise of Liberal Environmentalism
Mark W. Zacher, University of British Columbia
Clearly one of the best studies on international environmental politics.

"Bernstein convincingly and usefully rejects the role of epistemic communities as a driving force behind the norm change he identifies... Compelling... His attention to the role of ideas...

AC Power Systems Handbook, Third Edition (Electronic Handbook Series)
AC Power Systems Handbook, Third Edition (Electronic Handbook Series)
Sooner or later, power system protection is going to cost money. How much is entirely up to you. Setting up a safe and effective AC power system from the very beginning can help avoid costly downtime and repairs, provide backup power during system outages, and minimize workplace accidents. For the past 15 years, Jerry Whitaker's AC Power Systems...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this...

Grossman's Cardiac Catheterization, Angiography, and Intervention
Grossman's Cardiac Catheterization, Angiography, and Intervention
The premier reference on cardiac catheterization is now in its thoroughly revised Seventh Edition, reflecting the rapid evolution and growing clinical use of interventional techniques. The completely revamped interventional section includes new material on treatment of pediatric and adult congenital heart disease, as well as on coronary...
Digital Rights Management: Protecting and Monetizing Content (NAB Executive Technology Briefings)
Digital Rights Management: Protecting and Monetizing Content (NAB Executive Technology Briefings)
"The author, who specialises in digital and interactive media, sets out the arguments with a view to readers being able to make informed decisions on the issues before them." -Book Shelf

Digital rights management (DRM) is a type of server software developed to enable secure distribution - and perhaps more
...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy