Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011

These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.

The Program Committee,...

Lift Application Development Cookbook
Lift Application Development Cookbook

Over 50 practical recipes to build web applications using Lift, the most secure web framework available

Overview

  • Lift made easy with step-by-steps recipes written by a developer for developers
  • Practical examples covering topics from basic to advanced levels
  • Learn to use...
Sage Timeslips For Dummies
Sage Timeslips For Dummies

Let Sage Timeslips For Dummies show you how to turn your time into money

If you run a business that bills for its time, it’s time you looked into Sage Timeslips and all it can do for you. This practical and friendly guide will help you get to know the Timeslips interface, set up templates for your business,...

Pro PowerShell for Microsoft Azure
Pro PowerShell for Microsoft Azure

This book is written for Windows professionals who are familiar with PowerShell and want to learn to build, operate, and administer their Windows workloads in the Microsoft cloud. Pro PowerShell for Microsoft Azure is packed with practical examples and scripts, with easy-to-follow explanations for a wide range of day-to-day...

Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

IBM Sametime 8.5.2 Administration Guide
IBM Sametime 8.5.2 Administration Guide
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5 is a very different product from previous versions of the product. What once was a simple offering that provided secure instant messaging with some web conferencing capabilities has now evolved into a robust, flexible, sophisticated communications...
Microsoft Windows Intune 2.0: Quickstart Administration
Microsoft Windows Intune 2.0: Quickstart Administration

Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.

This step-by-step guide will show you how to plan, set up and maintain Windows Intune,...

Web Development with Node and Express: Leveraging the JavaScript Stack
Web Development with Node and Express: Leveraging the JavaScript Stack

Learn how to build dynamic web applications with Express, a key component of the Node/JavaScript development stack. In this hands-on guide, author Ethan Brown teaches you the fundamentals through the development of a fictional application that exposes a public website and a RESTful API. You’ll also learn web architecture best...

Neo4j High Performance
Neo4j High Performance

Design, build, and administer scalable graph database systems for your applications using Neo4j

About This Book

  • Explore the numerous components that provide abstractions for pretty much any functionality you need from your persistent graphs
  • Familiarize yourself with how to test the...
Measurement, Modeling, and Evaluation of Computing Systems and Dependability and Fault Tolerance
Measurement, Modeling, and Evaluation of Computing Systems and Dependability and Fault Tolerance

This book constitutes the refereed proceedings of the 16th International GI/ITG Conference on Measurement, Modeling and Evaluation of Computing Systems and Dependability and Fault Tolerance, MMB & DFT 2012, held in Kaiserslautern, Germany, in March 2012.

The 16 revised full papers presented together with 5 tool papers and 5...

Practical Microsoft Azure IaaS: Migrating and Building Scalable and Secure Cloud Solutions
Practical Microsoft Azure IaaS: Migrating and Building Scalable and Secure Cloud Solutions
Adopt Azure IaaS and migrate your on-premise infrastructure partially or fully to Azure. This book provides practical solutions by following Microsoft’s design and best practice guidelines for building highly available, scalable, and secure solution stacks using Microsoft Azure IaaS. 

The author starts by
...
Inside Internet Security: What Hackers Don't Want You To Know
Inside Internet Security: What Hackers Don't Want You To Know
This book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business....
unlimited object storage image
Result Page: 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy