|
|
|
|
Essential PHP Tools: Modules, Extensions, and Accelerators
This book is an essential guide to some of the best free add-ons to PHP. These add-ons, or tools, provide invaluable functionality for improving your PHP web applications, including accessing databases, generating robust Web forms, using page templating systems, creating and parsing XML documents, authenticating users, and much more.
... | | Essential PHP SecurityBeing highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in... | | Implementing 802.1X Security Solutions for Wired and Wireless NetworksWhen deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an... |
|
Cisco Router Firewall SecurityThe Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches... | | Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000Although numerous books on security are available, many of them cover only theory or perhaps a security silo—that is, an island of security based on a particular tool, application, or technology. It should be obvious that no complete security solution is a silo; all secure business applications touch many tools and many technologies. Also,... | | Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Ad hoc and sensor networks continue to have a growing impact
on communication. These cost-effective wireless networks provide
location independent computing in environments ranging from
military battlefields to in-home patient monitoring systems. However,
having real-time connectivity to critical information over an open... |
|
|
|
|
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 |