Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Security
Learning iOS Security

Enhance the security of your iOS platform and applications using iOS-centric security techniques

About This Book

  • Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
  • Resolve common vulnerabilities and security-related shortcomings in iOS...
Football Traumatology: Current Concepts: from Prevention to Treatment
Football Traumatology: Current Concepts: from Prevention to Treatment

Football is probably the most widespread sport in the world. Like many other sports football has undergone major changes. It has increased in intensity, speed, and other factors contributing to increased risks of traumatic injury. Footballers, trainers, and the sport's medical staff are asking for greater information on the traumatic...

Authentication and Access Control: Practical Cryptography Methods and Tools
Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most notably in communications between users, servers, and devices. Unfortunately, this has led to many security challenges and problems. Recent examples include password leakage on large social network sites and defacement of websites. It is, therefore,...
Firing at Will: A Manager's Guide
Firing at Will: A Manager's Guide

Firing at Will shows managers and employers how to do the most difficult part of their jobs: firing employees. Written by a leading employment lawyer in a refreshingly unlawyerly style, this guide takes the reader through the always-risky process of letting an employee go. Many employers and managers are afraid to pull the...

Software Security : Building Security In
Software Security : Building Security In

Beginning where the best-selling book Building Secure Software left off, Software Security teaches you how to put software security into practice.The software security best practices, or touchpoints, described in this book have...

Forbes To The Limits: Pushing Yourself to the Edge In Adventure and in Business
Forbes To The Limits: Pushing Yourself to the Edge In Adventure and in Business

Praise for TO THE LIMITS

"Jim Clash not only has the guts to drive an Indy race car at 200 m.p.h., but the skills as a writer to let us know what it feels like."
–Mario Andretti, Indy 500 winner and Formula One World Driving Champion

"If Jim Clash wrote fiction, he would be the modern-day...

Migrating to MariaDB: Toward an Open Source Database Solution
Migrating to MariaDB: Toward an Open Source Database Solution
Mitigate the risks involved in migrating away from a proprietary database platform toward MariaDB’s open source database engine. This book will help you assess the risks and the work involved, and ensure a successful migration. 

Migrating to MariaDB describes the process and lessons learned during...
Windows Azure and ASP.NET MVC Migration
Windows Azure and ASP.NET MVC Migration
Deciding to take the leap from one technology to another is a difficult one. You face the risk of improper implementation of the technology, which can cause performance issues. You also face possible impact to business logic, which can produce disruption to your customers and partners. Many core business processes were written many years ago and...
Domain Engineering: Product Lines, Languages, and Conceptual Models
Domain Engineering: Product Lines, Languages, and Conceptual Models

Domain engineering is a set of activities intended to develop, maintain, and manage the creation and evolution of an area of knowledge suitable for processing by a range of software systems.  It is of considerable practical significance, as it provides methods and techniques that help reduce time-to-market, development costs, and...

Basic Guide to System Safety
Basic Guide to System Safety

This book provides guidance on including prevention through design concepts within an occupational safety and health management system. Through the application of these concepts, decisions pertaining to occupational hazards and risks can be incorporated into the process of design and redesign of work premises, tools, equipment, machinery,...

Vulnerability Management
Vulnerability Management

As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any...

Building Internet Firewalls
Building Internet Firewalls

More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images.Everyone is jumping on the Internet bandwagon. Once a...

unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy