Flylib.com
Index
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z]
Previous page
Table of content
Next page
Intelligent Enterprises of the 21st Century
ISBN: N/A
EAN: 2147483647
Year: 2003
Pages: 205
Authors:
Jatinder N. D. Gupta
,
S. K. Sharma
BUY ON AMAZON
Beginning Cryptography with Java
Symmetric Key Cryptography
Message Digests, MACs, and HMACs
CMS and S/MIME
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
The .NET Developers Guide to Directory Services Programming
Advanced LDAP Searches
Collection Class Usage
Dealing with Attributes with Many Values
Summary
The Standard Method
Image Processing with LabVIEW and IMAQ Vision
Introduction
Some Definitions
Other Image Sources
Spatial Image Filtering
Reading Instrument Displays
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Review Questions
Survivable Remote Site Telephony
Review Questions
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
IDS and IPS Architecture
Internet Security Systems RealSecure
Snort
Incident Response
The Future of Intrusion Detection and Prevention
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Media Simulation
Credibility and Computers
The Ethics of Persuasive Technology
Captology Looking Forward
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies