Related Articles
Search Results
Advertisement
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and
Current Offer
Loot.co.za
Mechanics Of User Identification And Authentication - Fundamentals Of Identity Management Hardcover
Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn
Current Offer
Loot.co.za
The Internet Of Things - From Rfid To The Next-generation Pervasive Networked Systems Hardcover
Current Offer
Loot.co.za
Long Term Evolution - 3GPP LTE Radio And Cellular Technology Hardcover
Current Offer
Loot.co.za
Information Security Management Handbook Volume 3 Hardcover 6TH Edition
Current Offer
Loot.co.za
Information Security Management Handbook Volume 4 Hardcover 6TH Edition
The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection
Current Offer
Loot.co.za
It Security Governance Guidebook With Security Program Metrics On Cd-rom Hardcover
Current Offer
Loot.co.za
Advanced Server Virtualization - Vmware And Microsoft Platforms In The Virtual Data Center Hardcover
Sensor networks differ from traditional networks in many aspects including their limited energy, memory space, and computational capability. These differentiators create unique security vulnerabilities. Security in Sensor Networks covers all aspects of
Current Offer
Loot.co.za
Wireless Mesh Networking - Architectures Protocols And Standards Hardcover
Current Offer
Loot.co.za
Multi-objective Optimization In Computer Networks Using Metaheuristics Hardcover
The rapid progress of mobile, wireless communication and embedded micro-sensing MEMS technologies has brought about the rise of pervasive computing. Wireless local-area networks (WLANs) and wireless personal-area networks (WPANs) are now common
Current Offer
Loot.co.za
Wireless Ad Hoc Networking - Personal-area Local-area And The Sensory-area Networks Hardcover