|
|
|
|
|
Java in a Nutshell : A Desktop Quick Reference (Java Series) (3rd Edition)The 3rd edition of the well-known reference, Java in a Nutshell, covers the essential APIs of Java 1.2, including networking, security, input and output, and basic language and utility classes. Due to the size of the Java 1.2 API, graphics and graphical user interface classes are now examined in a volume called Java Foundation Classes... | | | | Cryptography and Security Services: Mechanisms and ApplicationsToday's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and... |
|
Management, Control, and Evolution of IP NetworksStarting with various aspects of quality of service and the evolution of IP networks, this book covers the improvement of addressing in IP version 6, enhanced security, and the adaptation of video for the Internet and voice over IP. New generations of IP networks are discussed including the future of pervasive networks, wi-fi, the control of... | | | | |
|
JUNOS Security
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations... | | TSP: Leading a Development Team (The SEI Series in Software Engineering)
Leaders of software-development projects face many challenges. First, you must produce a quality product on schedule and on budget. Second, you must foster and encourage a cohesive, motivated, and smoothly operating team. And third, you must maintain a clear and consistent focus on short- and long-term goals, while exemplifying quality... | | Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.
The Program Committee,... |
|
|
Result Page: 356 355 354 353 352 351 350 349 348 347 346 345 344 343 342 341 340 339 338 |