 |
|
|
 Counting the Public In"A major scholarly work that adds greatly to our knowledge of the linkages between general public opinion and foreign policy." -- American Political Science Review
Ralph Levering Department of History, Davidson College, and author of The Public and American Foreign Policy, 1918-1978 ... |  |  Cryptography and Security Services: Mechanisms and ApplicationsToday's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and... |  |  |
|
|
 IP Network Design GuideThis redbook identifies some of the basic design aspects of IP networks and explains how to deal with them when implementing new IP networks or redesigning existing IP networks. This project focuses on internetwork and transport layer issues such as address and name management, routing, network management, security, load... |  |  Java Distributed Computing (O'Reilly Java)Java Distributed Computing discusses how to design and write distributed applications in Java. It covers Java's RMI (Remote Method Invocation) facility and CORBA, but it doesn't stop there; it tells you how to design your own protocols to build message-passing systems, discusses how to use Java's security facilities, how to write multithreaded... |  |  Java Security (2nd Edition)One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is... |
|
Result Page: 950 949 948 947 946 945 944 943 942 941 940 939 938 937 936 935 934 933 932 |