A Mathematical Introduction to Logic, Second Edition, offers increased flexibility with topic coverage, allowing for choice in how to utilize the...
This book is almost entirely concerned with stream ciphers, concentrating on a particular mathematical model for such ciphers which are called...
Windows Forensic Analysis DVD Toolkit addresses and discusses in-depth forensic analysis of Windows systems. The book takes the reader to a whole new...
Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in...
Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide...
This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers...
How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for...
Information Modeling and Relational Databases provides an introduction to ORM (Object Role Modeling)-and much more. In fact, it's the only book to go...
Given modern society's need to control its ever-increasing body of information, digital libraries will be among the most important and influential...
Protecting computer networks and their client computers against willful (or accidental) attacks is a growing concern for organizations and their...