|
|
|
|
Securing Java: Getting Down to Business with Mobile Code, 2nd EditionInformation Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent... | | WordPress BibleInstall WordPress and go beyond blogging
WordPress is so flexible that developers are now tapping it to create robust applications for content, contact, and e-mail management. Whether you're a casual blogger or programming pro, this comprehensive guide covers WordPress from the basics through advanced application development. Learn how... | | Insider Threats in Cyber Security (Advances in Information Security)
Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book... |
|
|
Designing a Data Warehouse : Supporting Customer Relationship ManagementThe main subject of this book is data warehousing. A data warehouse is a special kind of database that, in recent years, has attracted a great deal of interest in the information technology industry. Quite a few books have been published about data warehousing generally, but very few have focused on the design of data... | | Wireless Network Security (Signals and Communication Technology)Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the... | | Teach Yourself VISUALLY Windows 8.1
A practical guide for visual learners eager to get started with Windows 8.1
If you learn more quickly when you can see how things are done, this Visual guide is the easiest way to get up and running on Windows 8.1. It covers more than 150 essential Windows tasks, using full-color screen shots and step-by-step instructions to... |
|
Getting Started with SQL Server 2014 Administration
Optimize your database server to be fast, efficient, and highly secure using the brand new features of SQL Server 2014
About This Book
-
Design your SQL Server 2014 infrastructure by combining both onpremise and WindowsAzurebased technology
-
Implement the new InMemory OLTP database engine...
| | Getting Started with XenDesktop 7.x
Deliver desktops and applications to your end users, anywhere, anytime, with XenDesktop®7.x
Overview
-
Build a complete and secure XenDesktop 7 site from the ground up.
-
Discover how to virtualize and deliver accessible desktops and applications to your end users.
-
Full of...
| | Practical Signcryption (Information Security and Cryptography)
In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives... |
|
|
Result Page: 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 |