 |
|
 Internet Programming with OmniMark"I have been using OmniMark for a decade to solve many different kinds of information management problems. When OmniMark Technologies Corporation added features to their excellent language that allowed server functionality and database access, OmniMark became an even better, more powerful platform for data processing. When they made it... |  |  Delphi 5 Developer's Guide (Developer's Guide)The Delphi 5 Developer's Guide is a complete reference showing developers what they need to know most about Delphi 5. The text begins with a tour of Delphi 5 basics, including improvements since version 1. After observing object-oriented Pascal programming, including advanced language features, the authors turn to the strengths of using the Visual... |  |  SAP GRC For Dummies (Computer/Tech)Governance, risk, and compliance—these three big letters can add up to one giant headache. But GRC doesn't have to be a boil on your corporate behind. SAP GRC For Dummies untangles the web of regulations that confronts your company and introduces you to software solutions the not only keep you in compliance, but also make your whole... |
|
 Programmer's Ultimate Security DeskRefThe Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software... |  |  |  |  |
|
 |  |  Physical Security for IT"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each... |  |  Network Security Essentials (2nd Edition)This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols... |
|
|
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 |