 J2EE Security for Servlets, EJBs, and Web ServicesJ2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,... |  |  Degunking Microsoft OfficeDegunking Microsoft Office covers the basics to help you quickly get your PCs back to top performance. The unique thing about Degunking Microsoft Office is that it's organized according to the special "cleaning" process that will improve the performance of your computer. Shortcut and time calculation charts are provided... |  |  Complete Guide to CISM CertificationComplete Guide to CISMЮ Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices,... |