 |
|
|
 Pro Windows Phone 7 Development
Authoring a book on mobile development with a title that starts with “Pro” is a daunting task. Put in too
much introductory material and you lose the knowledgeable developer looking to take his application to
the next level. Breeze through key concepts and the cross-platform professional mobile developer may
struggle... |  |  Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... |  |  The History of Information Security: A Comprehensive Handbook
Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.
... |
|
|
 PhoneGap for Enterprise
Master the art of building secure enterprise mobile applications using PhoneGap
About This Book
-
Learn how to build secure mobile enterprise apps from scratch using PhoneGap
-
Understand PhoneGap's framework, including common issues and their resolutions, and become the go-to person in...
|  |  Computer Security for the Home and Small Office
Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene.
The book offers... |  |  Security for Multihop Wireless Networks
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area... |
|
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |