Network Security Essentials (2nd Edition) This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols... Writing from Start to Finish: A Six-Step Guide "Can help you knock out writers block" -- Boston Herald
Ideal for writing a short story, essay, review, or report, this guide provides beginning writers with the hands-on direction they need to improve their writing techniques and ability. Using a six-step approach to writing, this resource covers...
The Application of Programmable DSPs in Mobile Communications This book is about two technologies that have had, and will increasingly have, a significant impact on the way we all live, learn and play: personal wireless communications and signal processing. When it comes to both markets, history has shown that reality has often surprised the most optimistic forecasters.
We draw on the experience of...
Mastering Network Security The new edition of the highly-acclaimed and best-selling Mastering Network Security is here, and just in time! The past four significant Internet worm attacks alone have cost companies more than $10 billion in repairs and lost productivity. And as hackers continue to discover new ways to exploit vulnerable networks, the need for up-to-date security... Number Theory for Computing There are many surprising connections between the theory of numbers, which is one of the oldest branches of mathematics, and computing and information theory. Number theory has important applications in computer organization and security, coding and cryptography, random number generation, hash functions, and graphics. Conversely, number theorists...
Works through 35 cryptography modules supported by exercises and answers
This first part comprises thirteen modules. These modules will
familiarize you with some of the important terms and concepts of
cryptography in general and symmetric of one-key cryptography in specific.
Symmetric cryptography is the...
Introduction to Constraint Databases Constraint databases provide extra expressive power over relational databases in a largely hidden way at the data-storage or physical level. Constraints, such as linear or polynomial equations, are used to represent large sets in a compact manner. They keep the view of the database for a user or application programmer almost as simple as in... Microsoft Windows 2000 Scripting Guide
Welcome to the Microsoft® Windows® 2000 Scripting Guide.
As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a...
|Result Page: Previous 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next |