 |
|
|
|
 Secure Java: For Web Application Development
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure... |  |  Scene of the Cybercrime, Second Edition
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one... |  |  BizTalk 2010 EDI for Health Care: HIPAA Compliant 837 Solutions
Building a successful health care claims processing EDI implementation in BizTalk Server can be complex. Decisions must be made around how to extract and publish data, how to map to the 837 EDI standard, and how to appropriately batch and deliver data. If architected properly, your BizTalk solution can be highly efficient, simple, and... |
|
|
|
 |  |  The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley,... |  |  |
|
|
Result Page: 3 2 1 |