Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most
notably in communications between users, servers, and devices. Unfortunately,
this has led to many security challenges and problems. Recent examples include
password leakage on large social network sites and defacement of websites. It is,
therefore,... SQL: The Complete Reference, Second Edition The Most Comprehensive SQL Resource Available
Get in-depth details on all the powerful features and capabilities of SQL inside this one-stop guide. Featuring broad coverage of every aspect of this leading database language, this book provides you with an overview of SQL then shows you how to retrieve and update data, program with SQL, use...
Mathematical Tools in Signal Processing with C++ and Java Simulations
In recent decades, the study of signal processing has become increasingly complex, with new techniques and applications constantly being developed for the processing, transformation, and interpretation of signals. This book provides a comprehensive introduction to the traditional and modern methods used in signal processing. It is designed to...
|Result Page: 909 908 907 906 905 904 903 902 901 900 |