|
|
|
|
|
Practical Signcryption (Information Security and Cryptography)
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives... | | Enterprise DevOps Framework: Transforming IT Operations
Transform your IT organization from one weighed down by set practices to one with a DevOps culture and a cloud-first strategy that is optimized by automation and other lean practices. In this engaging read, you will discover the opportunities, challenges, lessons, and rewards that CA Technologies encountered when making their agile... | | |
|
|
Writing Security Tools and ExploitsExploits. In most information technology circles these days, the term exploits has become synonymous with vulnerabilities or in some cases, buffer overflows. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly,... | | | | Understanding the Local MediaHow will local media deal with the challenge of the Internet? How important is regional news to the nations of the UK? What does the future hold for newspapers, regional television and local radio news? Most adults in the UK read a local newspaper; regional news bulletins are among the most-watched on television; and local radio has a loyal... |
|
|
Result Page: 210 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 |