Home | Amazing | Today | Tags | Publishers | Years | Search 
MongoDB in Action
MongoDB in Action

Databases are the workhorses of the information age. Like Atlas, they go largely unnoticed in supporting the digital world we’ve come to inhabit. It’s easy to forget that our digital interactions, from commenting and tweeting to searching and sorting, are in essence interactions with a database. Because of this fundamental...

Spring Security 3
Spring Security 3

Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.

A comprehensive guide to Spring Security 3. You will learn...

Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

ModSecurity 2.5
ModSecurity 2.5
With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you...
Encyclopedia of Cybercrime
Encyclopedia of Cybercrime
The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and
...
Becoming
Becoming
Do you remember your radio and "Captain Midnight," "The Lone Ranger," "Junior Miss" and "Let's Pretend"? The first time you inhaled a cigarette? Your first swallow of hard liquor? The thrill of the first exploration of the body of your boyfriend, girlfriend, husband, wife... your own body? Your first...
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

The Element of Fire
The Element of Fire
"The Element of Fire is a powerful fantasy." -- Locus Magazine, 1993

Scientific magic and fairy magic collide headlong in the threatened kingdom of Ile-Rien, where the Captain of the Queen's Guard fights a perilous battle standing between opposing forces seeking to topping the kingdom's young king. Reprint.
...
The Designer's Guide to VHDL, Volume 3, Third Edition (Systems on Silicon)
The Designer's Guide to VHDL, Volume 3, Third Edition (Systems on Silicon)
VHDL may sound like a new Internet language, but it really stands for VHSIC (Very High Speed Integrated Circuit) Hardware Definition Language. VHDL borrows ideas from software engineering (architectural, behavior, and formal models, as well as modular design) and is used to design today's custom integrated circuits, from cell phones to...
Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Handbook of Loss Prevention and Crime Prevention, Fourth Edition
Handbook of Loss Prevention and Crime Prevention, Fourth Edition
Security breaches, theft, and lack of resources due to natural or man-made disaster are all forms of corporate loss. The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, shows how to avoid or minimize these losses with a wealth of practical information.
This revised volume brings together the expertise of
...
Foundation Website Creation with CSS, XHTML, and JavaScript
Foundation Website Creation with CSS, XHTML, and JavaScript
Coming to web development with a blank slate can be pretty intimidating. There are a lot of things to learn about the proper construction of a website. The most successful websites have a great deal of thought and work put into them before they’re even put into production.

Although it can be scary, there has never been a better
...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy