|
|
|
|
|
|
Beginning Cryptography with JavaBeginning Cryptography with Java
While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.
This book teaches you how. Chapters one through... | | SIP TrunkingThe first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions
Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a... | | Moodle Security
Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys... |
|
|
|
Result Page: 142 141 140 139 138 137 136 135 134 133 132 131 130 129 |