博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Internet and Wireless Security (Btexact Communications Technology Series, 4)
阅读量:4232 次
发布时间:2019-05-26

本文共 927 字,大约阅读时间需要 3 分钟。

版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 - topmvp
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses and this book presents an overview of current and future infrastructures for e-business including XML security mechanisms and next generation Public Key Infrastructures (PKI), as well as digital archiving and wireless security which is set to be a huge growth area with the full rollout of 3G mobile networks. TETRA security, firewalls and Virtual Private Network (VPN) technologies are all discussed to provide business solutions for end-to-end secure networking. This book is essential reading for IT and security professionals as well managers involved in the implementation of e-businesses.
http://mihd.net/xlvf8g
http://rapidshare.com/files/60824020/0852961979.zip
你可能感兴趣的文章
浅谈增值业务及双向运营支撑平台
查看>>
JMS开发指南
查看>>
在linux上执行远程命令(ssh、ftp)
查看>>
四大数据库性能比较
查看>>
andoird wifi 点对点连接笔记本的ad-hoc
查看>>
通过shell获取当前网络的出口IP地址(路由器外网IP)
查看>>
写给大家看的设计书阅读笔记1——设计的四大基本原则
查看>>
Makefile快速入门学习笔记
查看>>
Elasticsearch、Logstash 、kibana安装配置
查看>>
Spring Boot 解决跨域问题的 3 种方案!
查看>>
SQL 性能优化,开发注意事项
查看>>
logback配置文件模板
查看>>
指针函数和冒泡排序法算法案例
查看>>
批处理修改地址为静态和动态的方法
查看>>
easyui $.messager.alert失效问题
查看>>
java适配器模式
查看>>
android studio 删除module
查看>>
android jsbridge实现原理简述
查看>>
java继承中的重写和隐藏
查看>>
java内部类为什么可以访问外部类属性方法
查看>>