Flylib.com
Appendix C. Instant Messaging Encryption
Previous page
Table of content
Next page
Section C.1. Overview
Section C.2. The Use Cases
Previous page
Table of content
Next page
Use Cases: Requirements in Context (2nd Edition)
ISBN: 0321154983
EAN: 2147483647
Year: 2002
Pages: 90
Authors:
Daryl Kulak
,
Eamonn Guiney
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Key and Certificate Management Using Keystores
Appendix B Algorithms Provided by the Bouncy Castle Provider
Appendix C Using the Bouncy Castle API for Elliptic Curve
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Other Cisco IP Telephony Solutions for the Enterprise Branch and Small and Medium Offices
Setting Up a Cisco UE Automated Attendant
Configuring Cisco UE Backup and Restore
Security Best Practices for Cisco CME
Troubleshooting Call Transfers and Call Forwards
The Complete Cisco VPN Configuration Guide
Packet Authentication
ISAKMP/IKE Phase 2
SSL VPNs
VPN Client Software Updates
Summary
Twisted Network Programming Essentials
Installing Twisted
Responding to HTTP Requests
Managing a Hierarchy of Resources
Running a Basic NNTP Server
Services, Processes, and Logging
File System Forensic Analysis
Hard Disk Technology
File System Analysis
Content Category
Bibliography
Directory Entries
Python Programming for the Absolute Beginner, 3rd Edition
The os Module
Forking Processes
HTMLgen: Web Pages from Objects
Extending Python
The SWIG Integration Code Generator
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies