Flylib.com
Networks, Protocols & APIs
↵
Beginning Cryptography with Java
The JCA and the JCE
Message Digests, MACs, and HMACs
Distinguished Names and Certificates
Appendix A Solutions to Exercises
Appendix C Using the Bouncy Castle API for Elliptic Curve
Certified Ethical Hacker Exam Prep
Security Fundamentals
Security Testing
Key Terms
Protocols, Standards, and Applications
Social Engineering
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Tcpdump
Internet Security Systems RealSecure
Cisco Secure IDS
Snort
Laws, Standards, and Organizations
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
Computers as Persuasive Tools
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Captology Looking Forward
Quantitative Methods in Project Management
Project Value: The Source of all Quantitative Measures
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Expense Accounting and Earned Value
Special Topics in Quantitative Management
Comparing, Designing, and Deploying VPNs
Configuring and Verifying L2TPv3 Pseudowires
Summary
Designing and Building SSL Remote Access VPNs (WebVPN)
Appendix A. VPLS and IPLS Layer 2 VPNs
Understanding IPLS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies