Passive Optical Networks: Principles and Practice The advent of video-on-demand and interactive gaming has prompted the deployment of broadband infrastructures. Because of its large bandwidth, Passive Optical Networks (PONs) are seen as the technology to make this happen. However, there are numerous standards and technologies - EPON, BPON, GPON, APON, WDM-PON, TDM-PON - which network providers and... Information Security Fundamentals, Second Edition
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides...
Network Security: A Beginner's Guide, Second Edition Essential Skills--Made Easy!
Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack...
Design and Analysis of Vaccine Studies (Statistics for Biology and Health)
Widespread immunization has many different kinds of effects in individuals and populations, including in the unvaccinated individuals. The challenge is in understanding and estimating all of these effects. This book presents a unified conceptual framework of the different effects of vaccination at the individual and at the population level....
Pro PHP Security
The Internet is a dangerous place for applications. In fact, it is reasonable to say that you
couldn’t create a less secure system if you tried. It is anonymous, uncontrolled, always on,
and instantly accessible from anywhere. This is a world where every bad actor, cracker, script
kiddie, and scam artist is your...
|Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 |