Home | Amazing | Today | Tags | Publishers | Years | Search 
The Craft of System Security
The Craft of System Security

"I believe The Craft of System Security is one of the best software security books on the market today. It has not only breadth, but depth, covering topics ranging from cryptography, networking, and operating systems--to the Web, computer-human interaction, and how...

CCENT: Cisco Certified Entry Networking Technician Study Guide: ICND1 (Exam 640-822 With CD)
CCENT: Cisco Certified Entry Networking Technician Study Guide: ICND1 (Exam 640-822 With CD)
Expert exam prep from leading Cisco authority Todd Lammle

Start your preparation here for Cisco's new CCENT entry-level networking certification, your entry point into Cisco's popular CCNA certification track. This comprehensive study guide from leading Cisco authority Todd Lammle thoroughly prepares you for the...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Replicated Data Management for Mobile Computing (Synthesis Lectures on Mobile and Pervasive Computing)
Mobility has become increasingly important for both business and casual users of computing technology. With the widespread adoption of portable computing devices, such as laptops, PDAs, tablet computers, music players, and cell phones, people can have almost constant access to their personal data as well as to information that is shared with...
Advances in Evolutionary Computing for System Design (Studies in Computational Intelligence)
Advances in Evolutionary Computing for System Design (Studies in Computational Intelligence)
Evolutionary computing paradigms offer robust and powerful adaptive search mechanisms for system design. This book includes thirteen chapters covering a wide area of topics in evolutionary computing and applications including: Introduction to evolutionary computing in system design; evolutionary neuro-fuzzy systems; evolution of fuzzy controllers;...
Wireless Networking Handbook
Wireless Networking Handbook
Many organizations utilize traditional wire-based networking technologies to establish connections among computers. These technologies fall into the following three categories:

• Local area networks (LANs)
• Metropolitan area networks (MANs)
• Wide area networks (WANs)

LANs support the sharing of
...
Take Control of Your AirPort Network
Take Control of Your AirPort Network
Wi-Fi networking is supposed to be simple. So why do so many people tear their hair out when trying to configure their wireless networks?It's all about the details. In this book, Wi-Fi experts Glenn Fleishman and Adam Engst put AirPort through its paces, teaching you in step-by-step, illustrated examples about how to remove the frustration in your...
Macs For Dummies, Eighth Edition
Macs For Dummies, Eighth Edition
Release the power of Mac’s newest OS and multimedia tools!

Work with files, set up a printer, use the iLife® suite, get online, and more

The Mac has become famous as the world’s friendliest computer, but this handy guide will smooth out any rough spots that might arise in your relationship. It takes you from the...

Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML
Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML
Written to address technical concerns that mobile developers face regardless of platform, this book explores the differences between mobile and stationary applications and the architectural and software development concepts needed to build mobile applications. Using UML, Reza B'far guides the developer through the development process, from design...
XML for ASP.NET Developers (Kaleidoscope)
XML for ASP.NET Developers (Kaleidoscope)
XML for ASP.NET Developers first gives a solid foundation in the basics of MSXML including XML Syntax, XML Schemas, Xpath, Xlink, Xpointer, and other concepts necessary to leverage the power of XML. After the building blocks of XML are thoroughly covered, Dan guides readers through manipulating XML documents using the Document Object Model (DOM)...
Advanced PIC Microcontroller Projects in C: From USB to RTOS with the PIC 18F Series
Advanced PIC Microcontroller Projects in C: From USB to RTOS with the PIC 18F Series
This book is ideal for the engineer, technician, hobbyist and student who have knowledge of the basic principles of PIC microcontrollers and want to develop more advanced applications using the 18F series.

The architecture of the PIC 18FXXX series as well as typical oscillator, reset, memory, and input-output circuits is completely
...
Cryptography and Security Services: Mechanisms and Applications
Cryptography and Security Services: Mechanisms and Applications
Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and...
Result Page: 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy