 |
|
 Computer Networks, Fourth EditionThe world's leading introduction to networking-fully updated for tomorrow's key technologies.
Computer Networks, Fourth Edition is the ideal introduction to today's networks-and tomorrow's. This classic best seller has been thoroughly updated to reflect the newest and... |  |  VPNs Illustrated : Tunnels, VPNs, and IPsecVirtual private networks (VPNs) based on the Internet instead of the traditional leased lines offer organizations of all sizes the promise of a low-cost, secure electronic network. However, using the Internet to carry sensitive information can present serious privacy and security problems. By explaining how VPNs actually... |  |  Internet Security: Cryptographic Principles, Algorithms and ProtocolsCryptography is the key to securing the Internet
If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important... |
|
 Contemporary Cryptography (Artech House Computer Security503)With the current ubiquity of computer networks and distributed systems in general, and the Internet in particular, cryptography has become an enabling technology to secure the information infrastructure(s) we are building, using, and counting on in daily life. This is particularly true for modern cryptography.5 The important role... |  |  Building Secure Wireless Networks with 802.11An implementer’s guide to setting up, configuring, and managing a secure wireless network
Whether you’re creating wireless networks for the home, small office, or enterprise, this innovative book presents a step-by-step approach to successfully building a wireless LAN that meets all of your security needs. Beginning with a... |  |  Introduction to Algorithms, Second EditionThe book moves forward with more advanced algorithms that implement strategies for solving more complicated problems (including dynamic programming techniques, greedy algorithms, and amortized analysis). Algorithms for graphing problems (used in such real-world business problems as optimizing flight schedules or flow through pipelines) come next.... |
|
|
 Stealing the Network: How to Own an IdentityThe first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the... |  | |  | |
|
| Result Page: 5 4 3 2 1 |