-
201by Behrouz A. ForouzanSubjects: “...Synopsis: Cryptography and Network Security 1 Introduction Part 1 Symmetric-Key Encipherment 2...”
Published
TEXT -
202by Gary McGrawSubjects: “...Software Security is about putting the touchpoints to work for you. Because you can apply...”
Published
TEXT -
203by - Wasito S.Subjects: “..., this offical study guide covers topics such as server roles and security, infrastructure planning and design...”
Published
TEXT -
204by Dave TaylorSubjects: “... privacy and security issues, and much more. Youll al...”
Published
TEXT -
205by Susan M. CooneySubjects: “... privacy and security issues, and much more. Youll al...”
Published
TEXT -
206by Timothy R. MayesSubjects: “..., budgets, the Market Security Line, pro forma state...”
Published
TEXT -
207by Todd M. ShankSubjects: “..., budgets, the Market Security Line, pro forma state...”
Published
TEXT -
208by Raj Kumar ShrivastavSubjects: “... of data security. 7. Information Technology app...”
Published
TEXT -
209
-
210by Merritt MaximSubjects: “... Windows CE, Palm OS, UNIX, and Windows. Youll learn how to design and implement a solid security system...”
Published
TEXT -
211by David PillinoSubjects: “... Windows CE, Palm OS, UNIX, and Windows. Youll learn how to design and implement a solid security system...”
Published
TEXT -
212by Alan CalderSubjects: “... practice information security is essential. Written in clear English, this book explains why so many...”
Published
TEXT -
213by Firrar UtdirartatmoSubjects: “...Internet, hacking, vulnerability, malicious, exploit dan security hole adalah kosa kata yang sering...”
Published
TEXT -
214by Rahmat RafiudinSubjects: “...Fokus utama buku ini membahas tentang security komputer untuk komputer-komputer berbasis sistem...”
Published
TEXT -
215
-
216by Adam QuiggleSubjects: “...VPNs (Virtual Private Networks) allow for secure communications over publicly shared infrastructure...”
Published
TEXT -
217by Andrew A. VladimirovSubjects: “... administrator needs to know to deploy wireless networks securely. --Robert Haskins, Chief Technology Officer...”
Published
TEXT -
218by Robert C. WibleSubjects: “...This reference presents the guidelines you need to create safer, more secure buildings...”
Published
TEXT -
219by C.S.R. PrabhuSubjects: “... the demands of the present and of the future. Bluetooth is the most secure among all wireless technologies...”
Published
TEXT -
220by Securities CommissionSubjects: “... Jurisprudence Syariah Criteria for Listed Securities Glos...”
Published
TEXT