Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive... Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole
new level. Whether you’re in the IT department, a systems integrator, a business
leader, or an end user, Fusion Applications has more of what you need, less of
what you don’t, and some of what you didn’t even think possible.
Cryptography in C and C++
Detailed treatment of public key cryptography with detailed coverage of the RSA algorithm that is now in the public domain
Explains and includes an implementation of Rijndael, the new American Encryption Standard in both C and C++
Not toy code(tm), but a practical treatment of modern cryptographic
Perfect Passwords: Selection, Protection, Authentication User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According...
Cybersecurity Operations Handbook Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
|Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 |