Søgning på underkategorier- og emner:
Bemærk: Kan leveres før jul.
SSH is a popular protocol for securing your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations... Læs mere
Bemærk: Kan leveres før jul.
Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum—the open source blockchain-based distributed computing platform.
Bemærk: Kan ikke leveres før jul.
Explaining how to write secure programs using Java's cryptographic tools, this text discusses authentication, key management, public and private key encryption.
Bemærk: Kan ikke leveres før jul.
Network administrators, auditors and architects know the importance of securing networks and finding security solutions that can be implemented quickly. This text focuses on ways to secure Cisco routers, it is a reference for protecting the protectors.
Bemærk: Kan ikke leveres før jul.
An anthology that describes methods used to secure computer systems in the face of threats. It covers topics that include: rewiring the expectations and assumptions of organizations... Læs mere
Bemærk: Kan ikke leveres før jul.
Since its publication,Security Analysis by Graham and Dodd has been the investment bible and has sold more than 750,000 copies. Now the fifth edition of this classic... Læs mere
Bemærk: Kan ikke leveres før jul.
From the exclusive publishers of Oracle Press Books, here is the only book available offering complete coverage of RMAN (Recovery Manager), Oracle’s free backup and recovery technology.
Bemærk: Kan ikke leveres før jul.
First to market! This is the only book focusing solely on Cisco network hacking, security auditing and defense issues.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The historic European Union Directive on Data Protection will take effect in October 1998. A key provision will prohibit transfer of personal information from Europe to other countries if they lack ""adequate"" protection of privacy.
Bemærk: Kan ikke leveres før jul.
This book explores the fundamentals and applications of Blockchain technology. Readers will learn about the decentralized peer-to-peer network, distributed ledger, and the trust model that defines Blockchain technology.
Bemærk: Kan ikke leveres før jul.
Providing a unique perspective from the center of the debates on end-to-end encryption, Moriarty explores... Læs mere