Home | Amazing | Today | Tags | Publishers | Years | Search 
Computer Networks, Fourth Edition
Computer Networks, Fourth Edition

The world's leading introduction to networking-fully updated for tomorrow's key technologies.

Computer Networks, Fourth Edition is the ideal introduction to today's networks-and tomorrow's. This classic best seller has been thoroughly updated to reflect the newest and...

VPNs Illustrated : Tunnels, VPNs, and IPsec
VPNs Illustrated : Tunnels, VPNs, and IPsec

Virtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually...

Internet Security: Cryptographic Principles, Algorithms and Protocols
Internet Security: Cryptographic Principles, Algorithms and Protocols
Cryptography is the key to securing the Internet

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...

Contemporary Cryptography (Artech House Computer Security503)
Contemporary Cryptography (Artech House Computer Security503)
With the current ubiquity of computer networks and distributed systems in general,
and the Internet in particular, cryptography has become an enabling technology to
secure the information infrastructure(s) we are building, using, and counting on in
daily life. This is particularly true for modern cryptography.5 The important role
...
Building Secure Wireless Networks with 802.11
Building Secure Wireless Networks with 802.11
An implementer’s guide to setting up, configuring, and managing a secure wireless network

Whether you’re creating wireless networks for the home, small office, or enterprise, this innovative book presents a step-by-step approach to successfully building a wireless LAN that meets all of your security needs. Beginning with a...

Introduction to Algorithms, Second Edition
Introduction to Algorithms, Second Edition
The book moves forward with more advanced algorithms that implement strategies for solving more complicated problems (including dynamic programming techniques, greedy algorithms, and amortized analysis). Algorithms for graphing problems (used in such real-world business problems as optimizing flight schedules or flow through pipelines) come next....
The Effective Incident Response Team
The Effective Incident Response Team

When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and...

Cryptography for Developers
Cryptography for Developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent
...
Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
  
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy