![](https://www.pdfchm.net/pic/empty.gif) |
|
|
|
![](https://pic.pdfchm.net/empty.gif) Network Security Assessment: From Vulnerability to PatchThis book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.
This is unique in that it details both the management and technical skill and tools... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Cryptography for DevelopersThe only guide for software developers who must learn and implement cryptography safely and cost effectively.
The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent... | ![](https://www.pdfchm.net/pic/empty.gif) | ![](https://pic.pdfchm.net/empty.gif) Google TalkingNationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications... |
|
|
Result Page: Previous 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 Next |