 |
|
|
 Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Lock down next-generation Web services
"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
... |  |  iPhone SDK Application Development: Building Applications for the AppStoreThis practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK... |  |  Foundation Rails 2I wrote this book with the goal of providing an introduction to Rails for people who have some passing familiarity with other scripting languages such as JavaScript or PHP. That being said, the main requirement for success with this book is simply going to be motivation and curiosity. Readers with an abundance of both, who are willing to go beyond... |
|
 SAP SD Interview Questions, Answers, and ExplanationsThe Ultimate Learning Guide for SAP SD Consultants
Includes certification Questions, Answers, and explanations!
It' s clear that SAP SD is one of the most challenging areas in SAP. Finding resources can be difficult. SAP SD Interview Questions, Answers, and Explanations guides you through... |  |  |  |  |
|
 |  |  Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... |  |  |
|
Result Page: 516 515 514 513 512 511 510 509 508 507 506 505 504 |