|
|
|
|
Learning iOS Security
Enhance the security of your iOS platform and applications using iOS-centric security techniques
About This Book
-
Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
-
Resolve common vulnerabilities and security-related shortcomings in iOS...
| | Football Traumatology: Current Concepts: from Prevention to Treatment
Football is probably the most widespread sport in the world. Like many other sports football has undergone major changes. It has increased in intensity, speed, and other factors contributing to increased risks of traumatic injury. Footballers, trainers, and the sport's medical staff are asking for greater information on the traumatic... | | Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most
notably in communications between users, servers, and devices. Unfortunately,
this has led to many security challenges and problems. Recent examples include
password leakage on large social network sites and defacement of websites. It is,
therefore,... |
|
|
Migrating to MariaDB: Toward an Open Source Database Solution
Mitigate the risks involved in migrating away from a proprietary database platform toward MariaDB’s open source database engine. This book will help you assess the risks and the work involved, and ensure a successful migration.
Migrating to MariaDB describes the process and lessons learned during ... | | Windows Azure and ASP.NET MVC Migration
Deciding to take the leap from one technology to another is a difficult one. You face the risk of improper implementation of the technology, which can cause performance issues. You also face possible impact to business logic, which can produce disruption to your customers and partners. Many core business processes were written many years ago and... | | Domain Engineering: Product Lines, Languages, and Conceptual Models
Domain engineering is a set of activities intended to develop, maintain, and manage the creation and evolution of an area of knowledge suitable for processing by a range of software systems. It is of considerable practical significance, as it provides methods and techniques that help reduce time-to-market, development costs, and... |
|
Basic Guide to System Safety
This book provides guidance on including prevention through design concepts within an occupational safety and health management system. Through the application of these concepts, decisions pertaining to occupational hazards and risks can be incorporated into the process of design and redesign of work premises, tools, equipment, machinery,... | | Vulnerability ManagementAs old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infrastructure, but as knowledge is power and the lifeblood of any... | | Building Internet Firewalls
More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images.Everyone is jumping on the Internet bandwagon. Once a... |
|
|
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 |