Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Semantic Service-Oriented Systems
Secure Semantic Service-Oriented Systems

As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is...

Microsoft Windows 7 Unleashed
Microsoft Windows 7 Unleashed

Covers Release Candidate of Windows 7. 

With purchase of this book you will get a free online edition written on final product. See product registration ad in back of book for details.

 

Microsoft® Windows 7 Unleashed...

MCITP Guide to Microsoft Windows Server 2008, Enterprise Administration (Exam # 70-647) (Mcts)
MCITP Guide to Microsoft Windows Server 2008, Enterprise Administration (Exam # 70-647) (Mcts)
MCITP Guide to Windows Server 2008, Enterprise Administrator (Exam 70-647) provides in-depth coverage of the 70-647 certifi cation exam objectives and focuses on the skills needed to manage a Windows Server 2008 enterprise. The book contains approximately 85 hands-on activities and 40 skill-reinforcing case projects, so...
Introduction to Cryptography: Principles and Applications
Introduction to Cryptography: Principles and Applications
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on an...

E-Commerce: A Control and Security Guide
E-Commerce: A Control and Security Guide

Once scoffed at during the dot.com year, the formerly staid, old, “brick and mortar” companies have now fully recognized and implemented the value of the Internet. Their new online infrastructure allows them to reach customers in new ways, open new markets, and reap new rewards. “Brick and mortar” is now “brick and...

Networking All-in-One Desk Reference for Dummies
Networking All-in-One Desk Reference for Dummies
9 books in 1– your key to networking success!

Your one-stop guide to building, securing, and administering networks large and small

So you’re in charge of the network? No worries! This handy all-in-one guide provides a bird’s-eye view of all the important stuff, like installing and configuring various network...

Application Development with Parse using iOS SDK
Application Development with Parse using iOS SDK

Develop the backend of your applications instantly using Parse iOS SDK

Overview

  • Build your applications using Parse iOS which serves as a complete cloud-based backend service
  • Understand and write your code on cloud to minimize the load on the client side
  • Learn how to create...
Linux Utilities Cookbook
Linux Utilities Cookbook

Linux is a stable, reliable and extremely powerful operating system. It has been around for many years, however, most people still don't know what it can do and the ways it is superior to other operating systems. Many people want to get started with Linux for greater control and security, but getting started can be time consuming and...

Excel 2010 Workbook For Dummies
Excel 2010 Workbook For Dummies

Reinforce your understanding of Excel with these Workbook exercises

Boost your knowledge of important Excel tasks by putting your skills to work in real-world situations. The For Dummies Workbook format provides more than 100 exercises that help you create actual results with Excel so you can gain proficiency.

...
Configuring IPCop Firewalls: Closing Borders with Open Source
Configuring IPCop Firewalls: Closing Borders with Open Source
This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for...
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)

This IBM Redbook considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This Redbook also documents the before and after configurations needed to take advantage of the recent...

Mobile and Wireless Network Security and Privacy
Mobile and Wireless Network Security and Privacy

Currently the mobile wireless technology is experiencing rapid growth. However the major challenge for deployment of this technology with its special characteristics is securing the existing and future vulnerabilities. Major security and privacy issues for standard wireless networks include the authentication of wireless clients and...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy