|
|
|
|
|
| | Perimeter SecurityPerimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource... | | |
|
Microsoft SQL Server 2012 Step by Step (Step by Step Developer)
Your hands-on, step-by-step guide to building applications with Microsoft SQL Server 2012
Teach yourself the programming fundamentals of SQL Server 2012—one step at a time. Ideal for beginning SQL Server database administrators and developers, this tutorial provides clear guidance and practical, learn-by-doing... | | JIRA 5.2 Essentials
Learn how to track bugs and issues, and manage your software development projects with JIRA
Overview
-
Learn how to set up JIRA for software development.
-
Effectively manage and handle software bugs and issues.
-
Includes updated JIRA content as well as coverage of the popular...
| | Mobile Application Development with SMS and the SIM ToolkitGet mobile messaging going on virtually any platform, in any language
Mobile Application Development Using SMS and the SIM Toolkit is just the guide you’ve been looking for if you’re building applications for GSM or 3G networks, wish you had sample code for reality-based applications, or want to add mobile... |
|
Ajax SecurityThe Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities
More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this... | | Secure Java: For Web Application Development
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure... | | Engineering Secure Software and Systems: Third International Symposium
It is our pleasure to welcome you to the third edition of the International Symposium
on Engineering Secure Software and Systems.
This unique event aims at bringing together researchers from software engineering
and security engineering, which might help to unite and further develop
the two communities in this and future... |
|
|
Result Page: 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 |