Книги жанра зарубежная компьютерная литература: скачать бесплатно или читать онлайн в электронной библиотеке Fantasy Worlds Страница 50
Вы не авторизовались
Войти
Зарегистрироваться

Книги жанра зарубежная компьютерная литература

Using Aspect-Oriented Programming for Trustworthy Software Development
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented programming (AOP), but also exploring their critical interrelationships. The author clearly demonstrates how typical TWC tasks such as security checks, i…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Using Aspect-Oriented Programming for Trustworthy Software Development
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented programming (AOP), but also exploring their critical interrelationships. The author clearly demonstrates how typical TWC tasks such as security checks, i…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Using Aspect-Oriented Programming for Trustworthy Software Development
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented programming (AOP), but also exploring their critical interrelationships. The author clearly demonstrates how typical TWC tasks such as security checks, i…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Programming Java 2 Micro Edition for Symbian OS
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Hands-on information to help you fully exploit the capabilities of MIDP 2.0 on Symbian OS (including MMA, WMA and Bluetooth). This practical guide will walk you through developing example applications illustrating key functionality and explain how to install these applications onto real devices. Focuses on J2ME MIDP 1.0 and 2.0, as this platform has become the Java standard for phones Covers the o…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
XSLT 2.0 and XPath 2.0 Programmer's Reference
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Combining coverage of both XSLT 2.0 and XPath 2.0, this book is the definitive reference to the final recommendation status versions of both specifications. The authors start by covering the concepts in XSLT and XPath, and then delve into elements, operators, expressions with syntax, usage, and examples. Some of the specific topics covered include XSLT processing model, stylesheet structure, seria…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Cryptography and Public Key Infrastructure on the Internet
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Cryptography and Public Key Infrastructure on the Internet
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Cryptography and Public Key Infrastructure on the Internet
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Cryptography and Public Key Infrastructure on the Internet
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

A practical guide to Cryptography and its use in the Internet and other communication networks. This overview takes the reader through basic issues and on to more advanced concepts, to cover all levels of interest. Coverage includes all key mathematical concepts, standardisation, authentication, elliptic curve cryptography, and algorithm modes and protocols (including SSL, TLS, IPSec, SMIME, & PGP…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Security Controls for Sarbanes-Oxley Section 404 IT Compliance
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a network must be set up with certain authentication computer science protocols (rules for computers to talk to one another) that guarantee security Addr…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Security Controls for Sarbanes-Oxley Section 404 IT Compliance
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a network must be set up with certain authentication computer science protocols (rules for computers to talk to one another) that guarantee security Addr…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Security Controls for Sarbanes-Oxley Section 404 IT Compliance
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a network must be set up with certain authentication computer science protocols (rules for computers to talk to one another) that guarantee security Addr…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Security Controls for Sarbanes-Oxley Section 404 IT Compliance
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology Offers an in-depth look at why a network must be set up with certain authentication computer science protocols (rules for computers to talk to one another) that guarantee security Addr…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Sourcebook of ATM and IP Internetworking
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Provides a comprehensive, detailed description of the fundamental architectural principles and protocols used in ATM-based networks, as well as interworking with IP and Frame Relay based networks Begins with general coverage of ATM, but moves quickly into the most important new area of ATM–IP switching, which allows communications companies to combine IP routing with ATM switching Offers the reade…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Sourcebook of ATM and IP Internetworking
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Provides a comprehensive, detailed description of the fundamental architectural principles and protocols used in ATM-based networks, as well as interworking with IP and Frame Relay based networks Begins with general coverage of ATM, but moves quickly into the most important new area of ATM–IP switching, which allows communications companies to combine IP routing with ATM switching Offers the reade…

Добавленo: Рейтинг: 4 Комментариев 0 шт.