Security & Encryption
epub |eng | 2011-03-17 | Author:Gordon S. Linoff & Michael J. Berry

( Category: Databases & Big Data June 18,2017 )
epub |eng | 2008-06-17 | Author:Jazib Frahim & Qiang Huang

( Category: Networking & Cloud Computing June 18,2017 )
epub |eng | 2011-05-22 | Author:David R. Miller & Michael Gregg

( Category: Certification June 18,2017 )
epub |rus | 0101-01-01 | Author:By Vijay Bollapragada, Mohamed Khalid, Scott Wainner [By Vijay Bollapragada, Mohamed Khalid, Scott Wainner]

( Category: Networking & Cloud Computing June 18,2017 )
epub |eng | 2013-09-24 | Author:Joe Kissell

( Category: Security & Encryption June 18,2017 )
epub, mobi |eng | | Author:Joseph Kong [Joseph Kong]

The modfind Function The modfind function returns the modid of a kernel module based on its module name. #include <sys/param.h> #include <sys/module.h> int modfind(const char *modname); Modids are integers used ...
( Category: Internet & Social Media June 18,2017 )
mobi |eng | 2009-02-08 | Author:Cox, Kerry J. & Gerg, Christopher [Cox, Kerry J.]

( Category: Networking & Cloud Computing June 18,2017 )
epub |eng | 2012-06-07 | Author:Steven Anson & Steve Bunting & Ryan Johnson & Scott Pearson

( Category: Networking & Cloud Computing June 18,2017 )
epub |eng | 2005-10-01 | Author:Matthew Macdonald [Macdonald, Matthew]

( Category: Web Development & Design June 17,2017 )
epub, pdf |eng | | Author:Sheran Gunasekera

Figure 6-13. Setting up an SSL/TLS Session TLS and SSL use a combination of cryptographic techniques to ensure data transmission is secure. Let’s look at this session setup now. I’m ...
( Category: Programming June 17,2017 )
epub |eng | 2012-07-02 | Author:Sean Bodmer & Dr. Max Kilger & Gregory Carpenter & Jade Jones [Bodmer, Sean & Kilger, Max & Carpenter, Gregory & Jones, Jade]

The ideas, conclusions, and opinions expressed in this chapter are those of the author. They do not reflect the official position of the US government or the Department of Defense. ...
( Category: Networking & Cloud Computing June 17,2017 )
epub |eng | 2012-06-16 | Author:Bob Vachon

Figure 12-11. NAT Wizard Welcome Window After reading the default policies that will be applied, click Next. The Basic NAT Wizard interface configuration window opens, as shown in Figure 12-12. ...
( Category: Networking & Cloud Computing June 17,2017 )
mobi, epub |eng | 2013-06-01 | Author:Wayner, Peter [Wayner, Peter]

The PipeNet's strict process for sending information ensures that each link between machines only carries the same amount of information at each step. The data moves along the chain in ...
( Category: Security & Encryption June 16,2017 )
epub |eng | 2013-04-01 | Author:Recx

DYNAMIC SQL – CURSORS An area where we’ve seen real issues that have potentially devastating effects is where dynamic SQL is used in a cursor. Consider the following vulnerable construct ...
( Category: Security & Encryption June 15,2017 )
epub |eng | 1999-01-02 | Author:Microsoft Corporation [Microsoft Corporation]

Reading the Meter After the meter is set up, you are ready to test a wall outlet. There are three tests to perform. With AC voltage, it does not matter ...
( Category: Software June 15,2017 )