Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Professional Website Performance: Optimizing the Front-End and Back-End
Professional Website Performance: Optimizing the Front-End and Back-End

THE PAST DECADE has seen an increased interest in website performance, with businesses of all sizes realizing that even modest changes in page loading times can have a signifi cant effect on their profi ts. The move toward a faster web has been driven largely by Yahoo! and Google, which have both carried out extensive research on the subject...

Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for...
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Foundations of Python Network Programming: The comprehensive guide to building network applications with Python
Foundations of Python Network Programming: The comprehensive guide to building network applications with Python

This second edition of Foundations of Python Network Programming targets Python 2.5 through Python 2.7, the most popular production versions of the language. Python has made great strides since Apress released the first edition of this book back in the days of Python 2.3. The advances required new chapters to be written from the ground up,...

Apache Cookbook: Solutions and Examples for Apache Administrators
Apache Cookbook: Solutions and Examples for Apache Administrators
There's plenty of documentation on installing and configuring the Apache web server, but where do you find help for the day-to-day stuff, like adding common modules or fine-tuning your activity logging? That's easy. The new edition of the Apache Cookbook offers you updated solutions to the problems you're likely to encounter with the new versions...
Developing Secure Applications with Visual Basic
Developing Secure Applications with Visual Basic

Using client-proven methods, and over 15 years of programming experience, expert author Davis Chapman empowers developers to create powerful, secure applications. Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own...

The Illustrated Network: How TCP/IP Works in a Modern Network (The Morgan Kaufmann Seris in Metworking)
The Illustrated Network: How TCP/IP Works in a Modern Network (The Morgan Kaufmann Seris in Metworking)
"This book provides a diverse and solid foundation that will be
immensely beneficial to new network engineers, those looking for a
refresher or developers"
-- Alan Young, Google, Network Surveillance Team

"i haven't had time to read the manuscript
...
Learning OpenVPN 2.0.9
Learning OpenVPN 2.0.9

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi, and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPsec VPN implementations. It uses the secure and stable TLS/SSL...

Enterprise Messaging Using JMS and IBM WebSphere
Enterprise Messaging Using JMS and IBM WebSphere
The real-world guide to JMS messaging with IBM WebSphere technologiesThis book offers start-to-finish guidance for building reliable, high-performance JMS-based messaging infrastructure with IBM WebSphere technologies.IBM expert Kareem Yusuf systematically introduces the latest versions of JMS—both 1.1 and 1.02b. Once you've thoroughly...
Selective Sentinel Lymphadenectomy for Human Solid Cancer (Cancer Treatment and Research)
Selective Sentinel Lymphadenectomy for Human Solid Cancer (Cancer Treatment and Research)
Lymph node (LN) status is the most important prognostic indicator for the clinical outcome of patients in human solid cancer. Recent developments in sentinel lymph node (SLN) concept and technology have resulted in the application of this revolutionary approach to determine if cancer has metastasized to the regional nodal basin....
Beginning Mac OS X Snow Leopard Server: From Solo Install to Enterprise Integration
Beginning Mac OS X Snow Leopard Server: From Solo Install to Enterprise Integration

This book is intended for those who need to get things done with Mac OS X Server 10.6. As such, you can use this book two ways. Those new to Mac OS X Server can read straight through the entire book, and by the end should feel competent to administer any Mac server thrown their way. For those with some knowledge of Mac OS X Server, or perhaps...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy