Spring Security 3.x Cookbook
Secure your Java applications against online threats by learning the powerful mechanisms of Spring Security. Presented as a cookbook full of recipes, this book covers a wide range of vulnerabilities and scenarios.
Learn about all the mandatory security measures for modern day applications using...
Cryptography and Network Security
The Internet, as a worldwide communication network, has changed our daily life in
many ways. A new paradigm of commerce allows individuals to shop online. The
World Wide Web (WWW) allows people to share information. The E-mail technology
conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-... UML Demystified There’s no easier, faster, or more practical way to learn the really tough subjects
UML Demystified explains how to read, model, and use UML to create well-structured, stable software products. This self-teaching guide comes complete with key points, background information, quizzes at the end of each chapter,...
Reason 3 for Windows and Macintosh : Visual QuickStart Guide Combining pristine sound quality with a comfortably retro-styled virtual rack (including a polyphonic synthesizer, mixing console, sampler, and drum machine), Reason has won legions of fans since its introduction. Now, everyone is singing its praises -- from bands like Nine Inch Nails and Prodigy to video producers. Here to show you why is the... Risk Management and Capital Adequacy
A Step-by-Step Approach for Integrating Market, Credit, and Operational Risk Management--While Complying with New Basel Accord Guidelines
For financial institutions around the world, the work involved in managing market, credit, and operational risk exposures--as well as the capital required to support such...
|Result Page: 10 9 8 7 6 5 4 3 2 1 |