Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Information Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent...
WordPress Bible
WordPress Bible

Install WordPress and go beyond blogging

WordPress is so flexible that developers are now tapping it to create robust applications for content, contact, and e-mail management. Whether you're a casual blogger or programming pro, this comprehensive guide covers WordPress from the basics through advanced application development. Learn how...

Insider Threats in Cyber Security (Advances in Information Security)
Insider Threats in Cyber Security (Advances in Information Security)

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mass of well-established worldwide researchers, and provides a unique multidisciplinary overview. Monica van Huystee, Senior Policy Advisor at MCI, Ontario, Canada comments "The book...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Java EE 7 First Look
Java EE 7 First Look

Discover the new features of Java EE 7 and learn to put them together to build a large-scale application

Overview

  • Explore changes brought in by the Java EE 7 platform
  • Master the new specifications that have been added in Java EE to develop applications without any hassle
  • ...
Designing a Data Warehouse : Supporting Customer Relationship Management
Designing a Data Warehouse : Supporting Customer Relationship Management

The main subject of this book is data warehousing. A data warehouse is a special kind of database that, in recent years, has attracted a great deal of interest in the information technology industry. Quite a few books have been published about data warehousing generally, but very few have focused on the design of data...

Wireless Network Security (Signals and Communication Technology)
Wireless Network Security (Signals and Communication Technology)
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the...
Teach Yourself VISUALLY Windows 8.1
Teach Yourself VISUALLY Windows 8.1

A practical guide for visual learners eager to get started with Windows 8.1

If you learn more quickly when you can see how things are done, this Visual guide is the easiest way to get up and running on Windows 8.1. It covers more than 150 essential Windows tasks, using full-color screen shots and step-by-step instructions to...

Getting Started with SQL Server 2014 Administration
Getting Started with SQL Server 2014 Administration

Optimize your database server to be fast, efficient, and highly secure using the brand new features of SQL Server 2014

About This Book

  • Design your SQL Server 2014 infrastructure by combining both onpremise and WindowsAzurebased technology
  • Implement the new InMemory OLTP database engine...
Getting Started with XenDesktop 7.x
Getting Started with XenDesktop 7.x

Deliver desktops and applications to your end users, anywhere, anytime, with XenDesktop®7.x

Overview

  • Build a complete and secure XenDesktop 7 site from the ground up.
  • Discover how to virtualize and deliver accessible desktops and applications to your end users.
  • Full of...
Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

unlimited object storage image
Result Page: 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy