 |
|
 |  |  Networking Explained, Second EditionGallo and Hancock provide a sophisticated introduction to their subject in a clear, readable format. These two top networking experts answer hundreds of questions about hardware, software, standards, and future directions in network technology.
- Wireless networks
- Convergence of voice and data
... |  |  |
|
 Demystifying the Ipsec Puzzle (Artech House Computer Security Series)Now that the Internet has blossomed into the "Information Superhighway," with its traffic (and drivers) becoming increasingly diverse, security has emerged as a primary concern. This innovative new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the... |  |  Accelerated GWT: Building Enterprise Google Web Toolkit ApplicationsAjax is a web development technique that takes advantage of JavaScript to display and interact dynamically with information embedded into a web page. Its emergence has made it possible to create web applications that closely resemble their desktop–based brethren. With this exciting new ability came several challenges; not only did developers... |  |  Cybersecurity Operations HandbookCybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity... |
|
|
|
Result Page: 928 927 926 925 924 923 922 921 920 919 918 917 916 915 914 913 912 911 910 |