|
|
|
|
Cryptography in C and C++, Second EditionThis book covers all that is needed to write professional-level cryptographic code. An expanded and improved version of the very well received first edition, it includes approximately 100 pages of new material as well as numerous improvements in the original text.
Text focusing on the practical aspects of cryptography in C and C++, ... | | Microsoft Office Live For Dummies (Computer/Tech)Automate common tasks like managing projects, customers, and documents
The fun and easy way to share your data online and grow your business
Want to make Office Live work for you? Now you can get up and running quickly in all the basics with this nuts-and-bolts guide. From creating a Web site... | | The Best Damn Firewall Book Period, Second EditionThe Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.
Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this... |
|
|
Microsoft Lync Server 2010 Unleashed
This is the industry’s most comprehensive, realistic, and useful guide to Microsoft Lync Server 2010. It brings together “in-the-trenches” guidance for all facets of planning, integration, deployment, and administration, from expert consultants who’ve spent years implementing Microsoft Unified... | | Email Security with Cisco IronPort (Networking Technology: Security)
The Cisco IronPort Email Security Appliances (ESA) have been deployed in thousands of networks to accept, filter, and deliver email messages. The ESA is easy to deploy and its security-filtering settings are effective right out of the box. However, many organizations are looking for more from their messaging environment... | | Security for Multihop Wireless Networks
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area... |
|
|
|
Result Page: 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 |