|
|
|
|
|
|
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
Must-have guide for professionals responsible for securing credit and debit card transactions
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking... | | C++ Design Patterns and Derivatives Pricing (Mathematics, Finance and Risk)'This is a short book, but an elegant one. It would serve as an excellent course text for a course on the practical aspects of mathematical finance.' International Statistical Institute
'This book is thought-provoking and rewarding. Even for the less experienced programmer, the presentation is readily accessible, and the coded examples... | | C: The Complete Reference, 4th Ed.
The Ultimate Resource on C—Thoroughly Updated for the New C Standard.
A new ANSI/ISO standard for C, called C99, has been recently adopted and Herb Schildt, the world's leading programming author, has updated and expanded his best-selling reference on C to cover it. Whether you are a beginning C programmer or a seasoned... |
|
Model-Driven Design Using Business PatternsBusiness applications are designed using profound knowledge about the business domain, such as domain objects, fundamental domain-related principles, and domain patterns. Nonetheless, the pattern community's ideas for software engineering have not impacted at the application level, they are still mostly used for technical problems.
This... | | Annotated C# Standard
This book is an annotated version of the C# Language Standard, created by adding around 400
separate annotations to the complete text of the Standard. The Standard was formally adopted
as ISO Standard 23270:2006 in April 2006 and published in August 2006, and adopted as Ecma
International Standard 334 version 4 in June 2006. Microsoft... | | Information Security Fundamentals, Second Edition
Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides... |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |