Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Commerce Security: Design and Development
Web Commerce Security: Design and Development

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems.

Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during...

The Complete Guide to Buying a Business
The Complete Guide to Buying a Business

The clear-cut information and forms you need to buy a business!

If you're ready to acquire a business, make sure you protect your interests and get the best deal possible with The Complete Guide to Buying a Business. It shows you how to:

  • ind the right business
  • analyze the seller's...
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention
Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention

Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support...

Learn Ionic 2: Develop Multi-platform Mobile Apps
Learn Ionic 2: Develop Multi-platform Mobile Apps

Explore key scenarios required for building quality Ionic apps quickly and easily and bring them to the iOS and Android mobile ecosystem.

Learn Ionic 2 explains various techniques to quickly integrate third-party back end systems. With this short guide, you'll benefit from practical examples of...

iOS Penetration Testing: A Definitive Guide to iOS Security
iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure. 

When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to
...
2016 Photographer's Market: How and Where to Sell Your Photography
2016 Photographer's Market: How and Where to Sell Your Photography

The Successful Photographer's Secret!

Thousands of successful photographers have trusted Photographer's Market as a resource for growing their businesses. This edition contains the most comprehensive and up-to-date market contacts for working photographers today: magazines, book publishers, greeting card...

eBay For Dummies
eBay For Dummies

The leading guide for eBay buyers and sellers, updated to give you all the essentials for buying and selling on eBay

More than 112 million people regularly use eBay. To find the best deals and make the best profits, you need the guidance in this book from eBay expert Marsha Collier! With more than half a million copies...
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Hacking Exposed Mobile: Security Secrets & Solutions
Hacking Exposed Mobile: Security Secrets & Solutions

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created...

The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
Even if the NFC standard is young (developed in 2004), I have been asked to write this book for several years now, due to the pioneering role played in France (and in Europe) by our Computer Science Master’s degree MBDS (www.mbds-fr.org) at the University of Nice – Sophia-Antipolis around the prototyping of innovative...
Mathematica by Example
Mathematica by Example
Mathematica bv Example is intended to bridge the gap which has existed between the very elementary handbooks available on Mathematica and those reference books written for the more advanced Mathematica users. This book is an extension of a manuscript which was developed to quickly introduce enough Mathematica commands to a group of...
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications
Blockchain for Business 2019: A user-friendly introduction to blockchain technology and its business applications

Your one-stop guide to blockchain technology and its business applications

Key Features

  • Assimilate blockchain services such as Ethereum and Hyperledger to transform industrial applications
  • Know in and out of blockchain technology to understand various business use...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy