 |
|
 MongoDB in Action
Databases are the workhorses of the information age. Like Atlas, they go largely unnoticed
in supporting the digital world we’ve come to inhabit. It’s easy to forget that our
digital interactions, from commenting and tweeting to searching and sorting, are in
essence interactions with a database. Because of this fundamental... |  |  Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.
A comprehensive guide to Spring Security 3. You will learn... |  |  Security on Rails
The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it... |
|
 ModSecurity 2.5With more than 67% of web servers running Apache and web-based attacks becoming more and more prevalent, web security has become a critical area for web site managers. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. Mod_security is a module running on Apache, which will help you... |  |  Encyclopedia of CybercrimeThe first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and... |  |  BecomingDo you remember your radio and "Captain Midnight," "The Lone Ranger," "Junior Miss" and "Let's Pretend"? The first time you inhaled a cigarette? Your first swallow of hard liquor? The thrill of the first exploration of the body of your boyfriend, girlfriend, husband, wife... your own body? Your first... |
|
 Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,... |  |  The Element of Fire"The Element of Fire is a powerful fantasy." -- Locus Magazine, 1993
Scientific magic and fairy magic collide headlong in the threatened kingdom of Ile-Rien, where the Captain of the Queen's Guard fights a perilous battle standing between opposing forces seeking to topping the kingdom's young king. Reprint.... |  |  The Designer's Guide to VHDL, Volume 3, Third Edition (Systems on Silicon)VHDL may sound like a new Internet language, but it really stands for VHSIC (Very High Speed Integrated Circuit) Hardware Definition Language. VHDL borrows ideas from software engineering (architectural, behavior, and formal models, as well as modular design) and is used to design today's custom integrated circuits, from cell phones to... |
|
 Implementing 802.1X Security Solutions for Wired and Wireless NetworksWhen deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an... |  |  Handbook of Loss Prevention and Crime Prevention, Fourth EditionSecurity breaches, theft, and lack of resources due to natural or man-made disaster are all forms of corporate loss. The Handbook of Loss Prevention and Crime Prevention, Fourth Edition, shows how to avoid or minimize these losses with a wealth of practical information. This revised volume brings together the expertise of... |  |  Foundation Website Creation with CSS, XHTML, and JavaScriptComing to web development with a blank slate can be pretty intimidating. There are a lot of things to learn about the proper construction of a website. The most successful websites have a great deal of thought and work put into them before they’re even put into production.
Although it can be scary, there has never been a better... |
|
Result Page: 7 6 5 4 3 2 1 |