Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet
Cryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:

* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation,
...
Deploying Virtual Private Networks with Microsoft Windows Server 2003
Deploying Virtual Private Networks with Microsoft Windows Server 2003

Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.

This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how...

Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it...
Apache Security
Apache Security

This all-purpose guide for locking down Apache arms readers with all the information they need to securely deploy applications. Administrators and programmers alike will benefit from a concise introduction to the theory of securing Apache, plus a wealth of practical advice and real-life examples. Topics covered include...

Txtng: The Gr8 Db8
Txtng: The Gr8 Db8
He combines an extraordinary knowledge of linguistics with a gift for popularizing. TLS. A highly consumable work of pop linguistics. Los Angeles Times Excellent. Crystal presents a compelling argument in favour of texting as a force for linguistic ability. Melissa Katsoulis, The Times

"Reports of the demise of the
...
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series in Networking)
TCP/IP Clearly Explained, Fourth Edition (The Morgan Kaufmann Series in Networking)
With over 30,000 copies sold in previous editions, this fourth edition of TCP/IP Clearly Explained stands out more than ever. You still get a practical, thorough exploration of TCP/IP networking, presented in plain language, that will benefit newcomers and veterans alike. The coverage has been updated, however, to reflect new and continuing...
Computer Incident Response and Product Security (Networking Technology: Security)
Computer Incident Response and Product Security (Networking Technology: Security)

This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...

Murach's Java Servlets and JSP, 2nd Edition
Murach's Java Servlets and JSP, 2nd Edition

Ever since the late 1990s when Java servlets and JavaServer Pages (JSPs) came into widespread use, web site developers have been switching from CGI scripting languages to servlets and JSPs. As a result, there has been tremendous growth in the use of servlets and JSPs. Today, there's little doubt that scrvlet and JSP technology is here to...

Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.

After a chapter explaining the most...

SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

Network Programming with Rust: Build fast and resilient network servers and clients by leveraging Rust's memory-safety and concurrency features
Network Programming with Rust: Build fast and resilient network servers and clients by leveraging Rust's memory-safety and concurrency features
Learn to write servers and network clients using Rust
Key Features
  • Build a solid foundation in Rust while also mastering important network programming details
  • Leverage the power of a number of available libraries to perform network operations in Rust
  • Develop a fully...
Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy