 |
|
|
 Instant Citrix Security How-to
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.
"Instant Citrix Security: How-to" will allow you to achieve simplicity in security when dealing... |  |  x86 Instruction Set Architecture
The Instruction Set Architecture, or ISA, is defined as that part of the processor architecture related to programming, including the native data types, instructions, registers, addressing modes, memory architecture, interrupt and exception handling, and external IO. With the exception of some small deviations and differences in... |  |  Smart Card Handbook
The most comprehensive book on state-of-the-art smart card technology available
Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health... |
|
 Rethinking Enterprise Storage: A Hybrid Cloud Model
Just as the Internet has fundamentally changed many industries, cloud computing is fundamentally changing the information technology industry, including infrastructures such as enterprise data storage. This book is about one of the new infrastructure game changers—a storage architecture called hybrid cloud storage that was ... |  |  |  |  Computer Security, Privacy and Politics: Current Issues, Challenges and Solutions
The intersection of politics, law, privacy, and security in the context of computer technology is both sensitive and complex. Computer viruses, worms, Trojan horses, spy-ware, computer exploits, poorly designed software, inadequate technology laws, politics and terrorism all of these have a profound effect on our daily computing operations... |
|
|
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 |