Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most
notably in communications between users, servers, and devices. Unfortunately,
this has led to many security challenges and problems. Recent examples include
password leakage on large social network sites and defacement of websites. It is,
therefore,... The Art of R Programming: A Tour of Statistical Software Design
R is the world's most popular language for developing statistical software: Archaeologists use it to track the spread of ancient civilizations, drug companies use it to discover which medications are safe and effective, and actuaries use it to assess financial risks and keep economies running smoothly.
PC Disaster and Recovery
Has disaster struck? If you’re reading this, something very bad may have already happened to your PC. Or maybe you’re wisely looking ahead to any of several what-if scenarios. Either way, PC Disaster and Recovery is the book you need to recover from today’s disaster and not lose sleep over the ones that lie around...
|Result Page: 50 49 48 47 46 45 44 43 42 41 |