Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)

Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.

As the...

Solaris 9 Administration: A Beginner's Guide
Solaris 9 Administration: A Beginner's Guide
Essential Skills--Made Easy!

Learn to set up, run, and support Solaris 9 across your network using this hands-on introductory guide. Beginning with an overview of this powerful operating system, this practical resource will show you how to install the SPARC version of Solaris 9 and manage Internet and intranet services, and will help you become...

Formal Correctness of Security Protocols (Information Security and Cryptography)
Formal Correctness of Security Protocols (Information Security and Cryptography)
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.

The author investigates proofs of correctness of realistic security protocols in...

Windows Server 2008 Bible
Windows Server 2008 Bible

Moving to Windows Server 2008? Start with this book.

Windows Server 2008 has arrived with many new features and choices, and this hands-on reference shows you how to handle them all. Whether you're starting from scratch or upgrading, you'll find a wealth of information on how to install, configure, manage, and...

Spring Security 3
Spring Security 3

Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.

A comprehensive guide to Spring Security 3. You will learn...

Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)
Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system’s security infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003...

Microsoft Dynamics AX 2009 Administration
Microsoft Dynamics AX 2009 Administration

Microsoft Dynamics AX 2009 is an advanced Enterprise Resource Planning system, essentially a comprehensive business management solution, designed for midsize and large organizations. Dynamics AX provides a centralized source for business data and enables you to consolidate and standardize your business processes, helping to improve...

The .NET Developer's Guide to Windows Security (Microsoft Net Development Series)
The .NET Developer's Guide to Windows Security (Microsoft Net Development Series)

The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on...

Hadoop Cluster Deployment
Hadoop Cluster Deployment

Construct a modern Hadoop data platform effortlessly and gain insights into how to manage clusters efficiently

Overview

  • Choose the hardware and Hadoop distribution that best suits your needs
  • Get more value out of your Hadoop cluster with Hive, Impala, and Sqoop
  • Learn useful...
Active Directory: Designing, Deploying, and Running Active Directory
Active Directory: Designing, Deploying, and Running Active Directory
Organize your network resources by learning how to design, manage, and maintain Active Directory. Updated to cover Windows Server 2012, the fifth edition of this bestselling guide gives you a thorough grounding of Microsoft's network directory service by explaining concepts in an easy-to-understand, narrative style.

...
Securing Weblogic Server 12c
Securing Weblogic Server 12c

Learn to develop, administer, and troubleshoot your WebLogic Server

  • Discover Authentication providers
  • Configure security for WebLogic applications and develop your own security providers
  • Step by step guide to administer and configure WebLogic security providers
  • Quick guide to...
unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy