|
|
|
|
Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Ad hoc and sensor networks continue to have a growing impact
on communication. These cost-effective wireless networks provide
location independent computing in environments ranging from
military battlefields to in-home patient monitoring systems. However,
having real-time connectivity to critical information over an open... | | The Mobile Application Hacker's Handbook
See your app through a hacker's eyes to find the real sources of vulnerability
The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward... | | Real World Java EE Patterns Rethinking Best Practices
This pragmatic book offers the real world knowledge you need to develop lean and maintainable Java EE 5 / 6 applications. Real World Java EE Patterns - Rethinking Best Practices guides you to efficient patterns and best practices in a structured way, with code from real world projects. This book includes coverage of: An introduction into the... |
|
|
|
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 |