|
|
|
|
|
Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum
Key Features
-
Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity
-
Explore various solution-based recipes to build smart contracts and foolproof...
| | IM Instant Messaging SecuritySecuring Instant Messaging (IM) is one of the top three priorities for IT managers to consider in the next 12 months. If IM security problems have been keeping you up at night . . . they should! According to research firm IDC, corporate IM users will jump from nearly 50 million in 2003 to over 181 million by 2005.
If your company is like... | | VMware VI3 Implementation and AdministrationThis is the most comprehensive guide to planning for, implementing, securing, maintaining, monitoring, and troubleshooting VMware VI3 in any IT environment. Written by Eric Siebert, a veteran VMware system administrator and one of only 300 vExperts named by VMware in 2009, this book will help IT professionals make the best... |
|
Maximum Linux Security (2nd Edition)Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.
Maximum Linux Security helps Linux administrators identify and plug security holes... | | CYA: Securing Exchange Server 2003 & Outlook Web AccessCoverage includes: Exchange 2000 Administrative Rights, Mailbox Rights, Denial of Service and Exchange, Types of File Vulnerabilities, Vulnerability of Transmitted Data, Message Authenticity, Event Service and Event Sinks, Message Relay via SMTP, Preventing Exchange Security Problems, The W2K/IIS Platform Must Be Solid, Dedicate Servers to Specific... | | Secure Roaming in 802.11 Networks (Communications Engineering)WLAN users want to remain connected to the network as they move from place to place in an office building, airport, library, etc. But the original 802.11 standard was not designed to support roaming. However, enhancements to the 802.11 now make it possible to add reliable, secure roaming capabilities to any 802.11-based WLAN. This thorough guide... |
|
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |