Flylib.com
Index_J
Previous page
Table of content
Next page
J
J2ME/CDC-based mobile code, 148
Jamming, 210, 211
Java Cryptography Architecture (JCA), 141
Java Secure Socket Extension (JSSE), 137
John the Ripper, 43 “44
Previous page
Table of content
Next page
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153
Authors:
John Rittinghouse PhD CISM
,
James F. Ransome PhD CISM CISSP
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle Advanced SELECT Options
Optimizing: The Oracle Side
Data Dictionary Report
Appendix B Functions
Beginning Cryptography with Java
Symmetric Key Cryptography
Distinguished Names and Certificates
Certificate Revocation and Path Validation
CMS and S/MIME
SSL and TLS
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Risk Analysis
Detailed Test Planning
The Test Manager
Appendix D Sample Master Test Plan
802.11 Wireless Networks: The Definitive Guide, Second Edition
Cryptographic Background to WEP
1X: Network Port Authentication
Management Architecture
Security Architecture
11 Network Analysis
Python Standard Library (Nutshell Handbooks) with
The nntplib Module
The sunaudio Module
Data Storage
The keyword Module
The tzparse Module
Python Programming for the Absolute Beginner, 3rd Edition
And Now for Something Completely Different
Generating Forward-Link Web Pages
Comparing Directory Trees
C Embedding API Overview
Section B.3. Environment Configuration
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies