 |
|
 Wireless Security and Cryptography: Specifications and ImplementationsAs the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which... |  |  Ophthalmology (Clinical Sciences)Like other medical specialties, ophthalmology undergoes constant enormous development in all its subspecialties. Assembling essential information is therefore an ever-recurring task, which needs to be done in various ways and for various target groups. The specialty of ophthalmology owes its development in recent years to numerous technical... |  |  Network Security: Know It AllAll of the elements of network security together in a single volume written by the best and brightest experts in the field!
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.
... |
|
 iPhone For Dummies (Computer/Tech)The iPhone 3G is here! You’ll want to make the most of it, and iPhone For Dummies, 2nd Edition is ready to help. Master the multitouch interface, send text messages, enjoy rich-HTML e-mail, use GPS maps, and more, with this full-color guide to show you how!
Edward C. Baig and “Dr. Mac” Bob LeVitus, two giants of... |  |  Essential Software Testing: A Use-Case ApproachMuch has been written about the difficulty of software testing. Often these laments are accompanied by cautionary words about how careful one has to be to ensure testing is done properly. However, there is a dearth of resources that give practical guidance on the nuts and bolts of testing. Essential Software Testing: A Use-Case... |  |  Security Software Development: Assessing and Managing Security RisksExamining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development... |
|
 Wireless Internet Security: Architecture and ProtocolsIn describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for... |  |  |  |  SiGe and Si Strained-Layer Epitaxy for Silicon Heterostructure DevicesWhat seems routine today was not always so. The field of Si-based heterostructures rests solidly on the shoulders of materials scientists and crystal growers, those purveyors of the semiconductor “black arts” associated with the deposition of pristine films of nanoscale dimensionality onto enormous Si wafers with near infinite... |
|
 Intelligent Network Video: Understanding Modern Video Surveillance SystemsThis is the first resource to provide detailed coverage of advanced digital networking and intelligent video capabilities and optimization. It addresses general concepts, explains why IP-based systems provide better image quality and more scalable and flexible systems at a lower cost, and provides current information on cameras and DVRs. It also... |  |  Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... |  |  Pro Tools for Music Production, Second Edition: Recording, Editing and MixingIf you are a music producer, recording engineer, musician, or composer there is definitely something in this book for you. If you are about to purchase new equipment, wish to troubleshoot technical problems, need guidance on how to achieve professional sounding results, or are looking for inspiration for new ideas - keep this book by your side.... |
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 |