 |
|
|
|
 Cryptography and Public Key Infrastructure on the InternetCryptography and Public Key Infrastructure on the Internet provides a thorough overview of the subject. It explains how susceptible networks are to hacking and how cryptography can help. This comprehensive and practical guide covers:
* Public Key Infrastructures (PKIs); important when using cryptography in a large organisation, ... |  |  The Hidden Power of Photoshop CSAlthoughI wasn’t really thinking about it at the time, in a way, I really started writing this book in 1992 when I first started using Photoshop professionally (with Photoshop 2). At the time I wasn’t planning to write a book, but I had already been involved with scanning and editing digital artwork for several years. I had become... |  |  |
|
 Advanced CalculusNew publisher! Corrected version! Demonstrating analytical and numerical techniques for attacking problems in the application of mathematics, this well-organized, clearly written text presents the logical relationship and fundamental notations of analysis. Buck discusses analysis not solely as a tool, but as a subject in its own right. This... |  |  Wireless SecurityGet full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless... |  |  Usability: Turning Technologies into Tools"The book contains much insight." --B. Hazeltine, Computing Reviews "Unusual in that the research it brings together spans the perspectives of cognitive psychology, the sociology of work and technology, work-oriented systems design, computer-supported cooperative work, and human-computer interaction. Although most of... |
|
Result Page: 1076 1075 1074 1073 1072 1071 1070 1069 1068 1067 1066 1065 1064 1063 1062 1061 1060 1059 1058 |