Home | Amazing | Today | Tags | Publishers | Years | Search 
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)
Writing Secure Code for Windows Vista (Pro - Step By Step Developer)

Get the definitive guide to writing secure code and developing more-secure applications for Windows Vista--straight from the experts. Security is one of the greatest enhancements in Windows Vista, and developers will be urged to write more secure code on the platform to support a growing customer base. This reference delivers the straight scoop...

Biometrics: Identity Verification in a Networked World
Biometrics: Identity Verification in a Networked World

An in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment

No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce...

Digital Crime And Forensic Science in Cyberspace
Digital Crime And Forensic Science in Cyberspace
itself. Forensics—the process, means, and methods for collecting crime evidence—can be said to date back to the 18th century stemming from forensic medicine and studies of anatomy and fingerprints. Crime manifests itself in various ways and forms and digital crime is the newest one. As the essence of the various forms of crime has...
CCIE Security Exam Certification Guide (CCIE Self-Study)
CCIE Security Exam Certification Guide (CCIE Self-Study)

Official self-study test preparation guide for the CCIE Security written exam

Review all CCIE Security written exam topics, including:

  • Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
  • DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
Pro PayPal E-Commerce (Expert's Voice)
Pro PayPal E-Commerce (Expert's Voice)
Pro PayPal E-Commerce contains the most comprehensive collection of information on the latest PayPal technologies available. It takes the approach of PayPal as a digital money platform, and shows how it's a dynamic service that offers far more than just payment processing.

With its breadth of technologies and APIs, the PayPal platform...

Formal Correctness of Security Protocols (Information Security and Cryptography)
Formal Correctness of Security Protocols (Information Security and Cryptography)
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.

The author investigates proofs of correctness of realistic security protocols in...

Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
Corporate Aftershock: The Public Policy Lessons from the Collapse of Enron and Other Major Corporations
"In the near future, someone will build a better Enron–a legitimate company with the means and integrity to revolutionize markets. That person will want to use Corporate Aftershock as his business manual and had better hope that government regulators are reading it as well."

–Ross M. Miller, author, Paving Wall...

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

Creative Evolutionary Systems (With CD-ROM)
Creative Evolutionary Systems (With CD-ROM)
This volume shows the current state of the art, and the science, of evolutionary creativity. It shows what can--and equally important, what can't--be done at the turn of the new millennium. What will have been achieved by the turn of the next one is anyone's guess. Meanwhile, it's intriguing, it's instructive, it's difficult, and it's fun!...
Advanced Techniques in Knowledge Discovery and Data Mining
Advanced Techniques in Knowledge Discovery and Data Mining
Data mining and knowledge discovery (DMKD) is a rapidly expanding field in computer science. It has become very important because of an increased demand for methodologies and tools that can help the analysis and understanding of huge amounts of data generated on a daily basis by institutions like hospitals, research laboratories, banks, insurance...
Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnet Detection: Countering the Largest Security Threat (Advances in Information Security)
Botnets have become the platform of choice for launching attacks and committing fraud on the Internet. A better understanding of Botnets will help to coordinate and develop new technologies to counter this serious security threat.

Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class...

Economics of Identity Theft: Avoidance, Causes and Possible Cures
Economics of Identity Theft: Avoidance, Causes and Possible Cures
Today, identity is more than anything, economic. The technology used to create, utilize and protect identities is increasingly ill-matched to the economics and uses of identities. Identity theft is the misuse of private authenticating information to steal money. Protecting identity requires privacy. Proving identity requires exposing information....
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy