 |
|
|
|
 Spring Security 3.x Cookbook
Secure your Java applications against online threats by learning the powerful mechanisms of Spring Security. Presented as a cookbook full of recipes, this book covers a wide range of vulnerabilities and scenarios.
Overview
-
Learn about all the mandatory security measures for modern day applications using...
|  |  Expert Oracle Exadata
Expert Oracle Exadata, 2nd Edition opens up the internals of Oracle's Exadata platform so that you can fully benefit from the most performant and scalable database hardware appliance capable of running Oracle Database. This edition is fully-updated to cover Exadata 5-2 and Oracle Database 12c. If you're new to Exadata,... |  |  Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.
Overview
-
Learn how mobile devices are monitored and the impact of cloud computing
... |
|
|
| Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |