A Great Way to Care Season 1 | Pete Davidson | The Go-Between
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

Firewall Fundamentals
Firewall Fundamentals

The essential guide to understanding and using firewalls to protect personal computers and your network

  • An easy-to-read introduction to the most commonly deployed network security device

  • Understand the threats firewalls are designed to...

Object-Oriented Design Heuristics
Object-Oriented Design Heuristics
Upon completion of an object-oriented design, you are faced with a troubling question: "Is it good, bad, or somewhere in between?" Seasoned experts often answer this question by subjecting the design to a subconscious list of guidelines based on their years of experience. Experienced developer Arthur J. Riel has captured this elusive,...
The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure
The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure
Traditional methods for handling spatial data are encumbered by the assumption of separate origins for horizontal and vertical measurements. Modern measurement systems operate in a 3-D spatial environment. The 3-D Global Spatial Data Model: Foundation of the Spatial Data Infrastructure offers a new model for handling digital...
Signal Integrity Issues and Printed Circuit Board Design
Signal Integrity Issues and Printed Circuit Board Design
The definitive high-speed design resource for every PCB designer

In this book, renowned engineer,author, and seminar leader Douglas Brooks teaches PCB designers how tosuccessfully design boards for any high-speed application. Brooks begins withan easy-to-understand electronics primer for every PCB designer, then...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Advanced Error Control Techniques for Data Storage Systems
Advanced Error Control Techniques for Data Storage Systems
With the massive amount of data produced and stored each year, reliable storage and retrieval of information is more crucial than ever. Robust coding and decoding techniques are critical for correcting errors and maintaining data integrity. Comprising chapters thoughtfully selected from the highly popular Coding and Signal Processing for Magnetic...
Hadoop: The Definitive Guide
Hadoop: The Definitive Guide

Discover how Apache Hadoop can unleash the power of your data. This comprehensive resource shows you how to build and maintain reliable, scalable, distributed systems with the Hadoop framework -- an open source implementation of MapReduce, the algorithm on which Google built its empire. Programmers will find details for analyzing...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Active Directory Cookbook
Active Directory Cookbook

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.

...

Sun Certified Enterprise Architect for Java EE Study Guide (2nd Edition)
Sun Certified Enterprise Architect for Java EE Study Guide (2nd Edition)

Definitive, Comprehensive SCEA Exam Prep–Straight from Sun’s Exam Developers!

 

This book delivers complete, focused review for Sun’s...

Result Page: 28 27 26 25 24 23 22 21 20 19 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy