Книги жанра зарубежная компьютерная литература: скачать бесплатно или читать онлайн в электронной библиотеке Fantasy Worlds Страница 60
Вы не авторизовались
Войти
Зарегистрироваться

Книги жанра зарубежная компьютерная литература

Computer Security and Cryptography
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers ga…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Computer Security and Cryptography
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers ga…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Computer Security and Cryptography
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers ga…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Computer Security and Cryptography
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers ga…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Information Architecture with XML
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

One of the only books on this subject to focus on XML's value as a business tool rather than the technology. This book deals with important management issues and focuses on demonstrating XML's value as a business tool. It emphasizes processes and business logic, and will show you how to go about introducing this technology and what must be done to achieve a smooth implementation. * Offers a manage…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Information Architecture with XML
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

One of the only books on this subject to focus on XML's value as a business tool rather than the technology. This book deals with important management issues and focuses on demonstrating XML's value as a business tool. It emphasizes processes and business logic, and will show you how to go about introducing this technology and what must be done to achieve a smooth implementation. * Offers a manage…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Information Architecture with XML
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

One of the only books on this subject to focus on XML's value as a business tool rather than the technology. This book deals with important management issues and focuses on demonstrating XML's value as a business tool. It emphasizes processes and business logic, and will show you how to go about introducing this technology and what must be done to achieve a smooth implementation. * Offers a manage…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Information Architecture with XML
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

One of the only books on this subject to focus on XML's value as a business tool rather than the technology. This book deals with important management issues and focuses on demonstrating XML's value as a business tool. It emphasizes processes and business logic, and will show you how to go about introducing this technology and what must be done to achieve a smooth implementation. * Offers a manage…

Добавленo: Рейтинг: 3 Комментариев 0 шт.
Hacking Point of Sale
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on.…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Hacking Point of Sale
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on.…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Hacking Point of Sale
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on.…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Hacking Point of Sale
Добавить В библиотекуАвторизуйтесь, чтобы добавить
5
Аннотация на книгу:

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on.…

Добавленo: Рейтинг: 5 Комментариев 0 шт.
Bioinformatics
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

In this book, Andy Baxevanis and Francis Ouellette . . . have undertaken the difficult task of organizing the knowledge in this field in a logical progression and presenting it in a digestible form. And they have done an excellent job. This fine text will make a major impact on biological research and, in turn, on progress in biomedicine. We are all in their debt. —Eric Lander from the Foreword Re…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
High-Speed Networking
Добавить В библиотекуАвторизуйтесь, чтобы добавить
4
Аннотация на книгу:

Leading authorities deliver the commandments for designing high-speed networks There are no end of books touting the virtues of one or another high-speed networking technology, but until now, there were none offering networking professionals a framework for choosing and integrating the best ones for their organization's networking needs. Written by two world-renowned experts in the field of high-s…

Добавленo: Рейтинг: 4 Комментариев 0 шт.
Highly Available Storage for Windows Servers
Добавить В библиотекуАвторизуйтесь, чтобы добавить
3
Аннотация на книгу:

The first how-to guide for online storage management with Windows 2000 In this book, expert Paul Massiglia first provides a clear tutorial on the principles of managed online storage and then walks you through the basics of how to manage your disks and RAID arrays in the Windows 2000 server environment. He provides all the information system administrators need to take advantage of Windows 2000's …

Добавленo: Рейтинг: 3 Комментариев 0 шт.