Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Protected: Internet, Intranet, & Virtual Private Networks

Buy
A systematic guide to the technologies, standards, protocols, and means used for the transparent security of information interaction in computer networks, this resource enables an independent understanding of the various methods of providing computer and information security when using modern network technology. The basic features of both Web technologies and the distributed information processing technologies connected with them that are based on mobile programs are described, as are the network technologies that influence security. Also covered are the methods of attacking computer networks and practical guidelines for protecting a virtual network.

About the Author
A. Moldovyan is the author of more than 60 articles on information protection. N. Moldovyan is head researcher at a specialized center for software systems. D. Summerville is assistant professor of electrical engineering at the State University of New York. He lives in Binghampton, New York. V. Zima is the author of 19 scientific articles.
(HTML tags aren't allowed.)

Professional Apache Geronimo (Wrox Professional Guides)
Professional Apache Geronimo (Wrox Professional Guides)
Geronimo is a popular production-grade Open Source J2EE 1.4 certified server available free of charge. It is the only server of its kind licensed under the Apache Software License 2.0, allowing free adaptation and modification for commercial or non-commercial use. The server is well-supported internationally by a large base of users, developers,...
Microsoft Office 2007 On Demand
Microsoft Office 2007 On Demand
How to Use

•        Office: Organize information and add impact with clip art, SmartArt diagrams, tables, and charts with a new results-oriented interface

•        Word: Create great-looking documents faster...

Herbal Supplements: Efficacy, Toxicity, Interactions with Western Drugs, and Effects on Clinical Laboratory Tests
Herbal Supplements: Efficacy, Toxicity, Interactions with Western Drugs, and Effects on Clinical Laboratory Tests

This book focuses on efficacy, toxicity, drug interactions, and abnormal clinical laboratory tests resulting from the use of herbal remedies. Although a few herbal remedies are safe and have efficacy (for example saw palmetto), many herbal remedies are toxic. This book guides in the interpretation of abnormal test results in otherwise healthy...


Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Object-Oriented Programming with ActionScript 2.0 (Voices That Matter)
Object-Oriented Programming with ActionScript 2.0 (Voices That Matter)

Master the principles of object-oriented programming as it is used with the most recent version of ActionScripting.

  • Object-Oriented Programming revolutionizes the way Flash developers interact with Flash.

  • This book provides...

Islamic Biomedical Ethics: Principles and Application
Islamic Biomedical Ethics: Principles and Application
Biomedical ethics is a burgeoning academic field with complex and far-reaching consequences. Whereas in Western secular bioethics this subject falls within larger ethical theories and applications (utilitarianism, deontology, teleology, and the like), Islamic biomedical ethics has yet to find its natural academic home in Islamic studies.
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy