This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...
Written by an experienced information security specialist, Investigating Computer-Related Crime is tailored to the needs of corporate information professionals and investigators. It gives a step-by-step approach to understanding and investigating security problems, and offers the technical information, legal information, and computer forensic...
This book discusses 32- and 64-bit 80x 86 assembly language programming inclusive of the SIMD instruction supersets that bring the 80x86 processor into the realm of the supercomputer. This book can be used in a self-taught or academic environment.
The increasing complexity of programming environments provides a number of opportunities for...
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.
This book is intended for C# and Visual Basic .NET developers who are writing Windows Forms applications. If you are moving from previous Windows GUI technologies such as Visual Basic 6.0 or MFC, or from those of other platforms such as Swing, or even if you are new to writing Windows applications, the tutorial section provides a complete...
This IBM Redbook looks at the overall Tivoli Enterprise Security Architecture, focusing on the integrated identity management solution covering authentication, authorization, provisioning, and privacy, as well as risk management throughout extensive e-business enterprise implementations. The available security product diversity in the...
Medical imaging is specific in that it concerns internal structures of organisms that are inaccessible to common imaging methods and that the imaging results are observed, evaluated, and classified mostly by non-technical staff. Development of new image processing methods and the interpretation of complicated or unexpected results require deep...
Novell GroupWise 7 Administrator Solutions Guide is the authoritative guide for successfully administrating and maintaining the newest release of Novell's communication and collaboration solution. Author Tay Kratzer, a Novell Premium Service-Primary Support Engineer, will provide you with insider...
The drag-and-drop power of Borland C++ Builder is yours to command with Teach Yourself Borland C++ Builder in 21 Days. In no time, you'll be able to rapidly build programs from reusable components. Using the methods taught in this book, you can increase your productivity and leverage your knowledge of C++ and Delpi to develop mainstream...
A comprehensive reference book for practical engineers and researchers focusing on neural network applications on signal processing, this text concerns itself with a vast array of signals. Among included signals, readers will find information on audio, video, speech, communication, geophysical, sonar, radar and medical signals. Written for those...
Using Visual C++ 6 provides a thorough tour of the essential features of Visual C++ 6 with plenty of hands-on programming examples. It's a good guide for any beginning or intermediate C++ programmer who wants to get a handle on Microsoft Foundation Classes (MFC) and the new Visual C++.
The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a clarity and lucidity that inspires confidence in the subject matter: a (nearly) freely redistributable SQL-interpreting database client/server...