|
|
Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | | | The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it
was unimportant: a quirky mechanism that allowed a
handful of students, plus a bunch of asocial, basementdwelling
geeks, to visit each other’s home pages dedicated
to science, pets, or poetry. Today, it is the platform
of choice for writing ... |
|
|
|
| | Windows Azure Step by Step
Windows Azure is the Microsoft cloud computing platform that lets developers leverage its
powerful, scalable, and fault-tolerant infrastructure to build successful applications.
Windows Azure Step by Step provides an organized walkthrough of the Windows Azure
platform and its related technologies. The text is... | | Google App Inventor
Google App Inventor is from the Internet giant Google, home of the famous search engine. Google also develops the Android operating system found on smartphones and tablet computers from many manufacturers including HTC, Motorola, Samsung, and a growing
host of others.
In late breaking news as this book goes to press, Google and... |
|
Result Page: 63 62 61 60 59 58 57 56 55 54 |