Chemical Analysis of Contaminated Land (Sheffield Analytical Chemistry) This book sets out to provide a description of the chemical analysis of potentially contaminated land for all those involved in risk assessment. It is not intended as a recipe book of analytical methods. Indeed, with the wide range of techniques and options available, it would be impracticable and unnecessary to document all potential methods, and...
Cryptography in C and C++
Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
Not toy code(tm), but a practical treatment of modern cryptographic
Perfect Passwords: Selection, Protection, Authentication User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According...
Cybersecurity Operations Handbook Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010
The present volume contains the proceedings of the seventh international workshop on Formal Aspects of Security and Trust (FAST 2010), held in Pisa, Italy, 16–17 September 2010, as part of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010).
FAST aims to foster cooperation among...
Data Protection and Information Lifecycle Management
The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...
|Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 |