 |
|
 Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from
reading your files, and cryptography that will stop major governments from reading your files. This
book is about the latter.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the... |  |  Secure Semantic Service-Oriented Systems
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is... |  |  Oracle ADF Enterprise Application Development - Made Simple
Welcome to your first real-life enterprise ADF application!
The book you are holding in your hands is about building serious applications
with Oracle Application Development Framework (ADF). You know that actual
development work is only one part of a successful project, and that you also need
structure, processes, and tools.
... |
|
|
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 |