|
|
|
|
Ethical HackingBy explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50... | | | | |
|
|
Computer and Intrusion Forensics (Artech House Computer Security Series)Computer forensics and intrusion forensics are rapidly becoming mainstream activities in an increasingly online society due to the ubiquity of computers and computer networks. We make daily use of computers either for communication or for personal or work transactions. From our desktops and laptops we access Web servers, e-mail... | | Reliability, Maintainability and Risk: Practical Methods for Engineers'The latest edition of this practical introduction to the basics of reliabilty, maintainability and safety introduces new sections on the accuracy of reliability prediction methods, common cause failures in systems, and expands and updates the descriptions of recent safety standards, in particular ISO 61508 and the use of 'Safety Integrity Levels'... | | The Essential Guide to Flex 3Flex 3 is the next generation of a technology that revolutionized web applications. It is the next evolutionary step of Flash, which has grown from a web animation medium to a powerful enterprise web design and development platform. With nearly 98% of all web browsers, and a growing number of mobile devices, running Flash Player, a knowledge of... |
|
| | Effective Databases for Text & Document ManagementThe focus of this book is effective databases for text and document management inclusive of new and enhanced techniques, methods, theories and practices. The research contained in these chapters is of particular significance to researchers and practitioners alike because of the rapid pace at which the Internet and related technologies are changing... | | Web Services SecurityMinimize security risks in your system by successfully rolling out secure Web Services with help from this exceptional guide. Web Services Security covers everything network security professionals need to know, including details on Web Services architecture, SOAP, UDDI, WSDL, XML Signature, XML Encryption, SAML, XACML, XKMS, and... |
|
|
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |