|
|
|
|
|
|
Secure XML: The New Syntax for Signatures and EncryptionExtensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical... | | Implementing ITIL Configuration ManagementPractical, Real-World ITIL Configuration Management–From Start to Finish
The IT Infrastructure Library® (ITIL) places the “best practices” in IT operations at your command. ITIL helps you make better technology choices, manages IT more effectively,... | | Scene of the Cybercrime, Second Edition
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one... |
|
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 |