Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Ad hoc and sensor networks continue to have a growing impact
on communication. These cost-effective wireless networks provide
location independent computing in environments ranging from
military battlefields to in-home patient monitoring systems. However,
having real-time connectivity to critical information over an open...
The Mobile Application Hacker's Handbook
See your app through a hacker's eyes to find the real sources of vulnerability
The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...
Spring Recipes: A Problem-Solution Approach
Spring Recipes: A Problem-Solution Approach, Third Edition builds upon the best-selling success of the previous editions and focuses on the latest Spring Framework features for building enterprise Java applications. This book provides code recipes for the following, found in the latest Spring:
|Result Page: 13 12 11 10 9 8 7 6 5 4 |