9 research outputs found

    Desain dan Implementasi Extranet

    No full text
    xvii + 325 hl

    Desain dan implementasi extranet

    No full text

    Simple steps to data encryption: a practical guide to secure computing

    No full text
    Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into wha

    Practical anonymity: hiding in plain sight online

    No full text
    For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to be

    IPv6 : theory, protocol, and practice /

    No full text
    Rev. ed. of: IPv6 clearly explained. c1999.Includes bibliographical references and index

    When Civil Society Uses an Iron Fist: The Roles of Private Associations in Rulemaking and Adjudication

    No full text

    Of Empires, Independents, and Captives: Law Blogging, Law Scholarship, and Law School Rankings

    No full text

    Retinitis pigmentosa: visual function and multidisciplinary management

    No full text
    corecore