|
|
|
|
|
|
|
SQL The Complete Reference, 3rd EditionGet comprehensive coverage of every aspect of SQL from three leading industry experts. Revised with coverage of the latest RDBMS software versions, this one-stop guide explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications.
SQL: The Complete Reference, Third... | | Secure Java: For Web Application Development
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure... | | Engineering Secure Software and Systems: Third International Symposium
It is our pleasure to welcome you to the third edition of the International Symposium
on Engineering Secure Software and Systems.
This unique event aims at bringing together researchers from software engineering
and security engineering, which might help to unite and further develop
the two communities in this and future... |
|
|
Result Page: 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 316 |