|
|
|
|
| | Malicious Cryptography: Exposing CryptovirologyHackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting it. In this fascinating, disturbing volume, the experts who first... | | Mac OS X: The Missing Manual, Panther EditionApple says that Mac OS X 10.3 introduces 150 new features--but that's not really true. In fact, "Panther" includes many more than that. It's faster, more polished, and much more efficient. But it still comes without a manual. With 300,000 copies in print, the first two versions of this book became industry bestsellers. Now David... |
|
Oracle SOA Suite Developer's GuideWe are moving towards a standards-based Service-Oriented Architecture (SOA), where IT infrastructure is continuously adapted to keep up with the pace of business change. Oracle is at the forefront of this vision, with the Oracle SOA Suite providing the most comprehensive, proven, and integrated tool kit for building SOA based applications. ... | | Cisco Network Professional's Advanced Internetworking GuideIdeal for any IT professional who uses Cisco technologies on a daily basis, or anyone who is preparing for their Cisco Certified Network Professional (CCNP) certification.
The topics covered will be more in depth than other introductory-level books of similar topics, and will span from layer 2 technologies such as switching, STP,... | | Expert SQL Server 2008 EncryptionEvery day organizations large and small fall victim to attacks on their data. Encryption provides a shield to help defend against intruders. Because of increasing pressure from government regulators, consumers, and the business community at large, the job descriptions of SQL DBAs and developers are expanding to include encryption. Expert SQL... |
|
|
|
|
Result Page: 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 |