Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
php architect's Guide to PHP Security|
php architect's Guide to PHP Security|
With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to write secure and reliable applications is becoming more and more important every day.

Written by Ilia Alshanetsky, on eo fhte foremost experts on PHP security in the world, php|architect's Guide to PHP Security focuses on...

My Motorola Atrix 4G
My Motorola Atrix 4G

Step-by-step instructions with callouts to Motorola Atrix 4G photos so that you can see exactly what to do

 

Help when you run into Motorola Atrix 4G problems or limitations

 

...

Moodle 3 Administration - Third Edition
Moodle 3 Administration - Third Edition

Key Features

  • Learn how to plan, install, optimize, customize, and configure Moodle
  • Guarantee a cutting-edge learning experience in a secure and customizable environment while optimizing your day-to-day workload
  • A one-stop guide with a problem-solution approach and a wide range of real-world...
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Maximize the powerful capabilities of Red Hat Enterprise and Fedora Linux using this
comprehensive and up-to-date reference. You'll get full details on everything from installation and
configuration to system administration and server management of Enterprise Linux-with specifics
on the Linux Kernel 2.6. Thorough security coverage
...
Red Hat Fedora Linux 3 Bible
Red Hat Fedora Linux 3 Bible
If Fedora Linux 3 can do it, you can do it too ...

Fedora Core 3 is Red Hat's most solid Fedora to date, including features destined for Red Hat Enterprise Linux 4. Use Fedora Core 3, with the latest Linux technology, to set up a personal desktop, small business server, or programming workstation. This book will teach you the basics of using...

The Debian System: Concepts and Techniques
The Debian System: Concepts and Techniques
The Debian GNU/Linux operating system approaches Linux system administration differently than other popular Linux distributions, favoring text-based configuration mechanisms over graphical user interfaces (GUIs). Debian may appear simplistic and even slightly outdated, but it is actually very robust, scalable, and secure. Debian's open development...
Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
Security and Privacy for Microsoft Office 2010 Users
Security and Privacy for Microsoft Office 2010 Users
SECURITY AND PRIVACY issues with computers and computer networks are constantly in the news these days, and everyone seems to be concerned about them to some degree. Businesses everywhere are worried about having sensitive customer information such as credit card numbers or email addresses stolen,...
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Linux® Patch Management: Keeping Linux® Systems Up To Date
Linux® Patch Management: Keeping Linux® Systems Up To Date

The Start-to-Finish Patch Management Guide for Every Linux® Environment

To keep your Linux systems secure, reliable, and productive, you must stay current with patches and updates. But, until now, it has been difficult to find usable,...

PHP Solutions: Dynamic Web Design Made Easy
PHP Solutions: Dynamic Web Design Made Easy
In this book you'll learn how to:
  • Create dynamic websites with design and usability in mind, as well as functionality
  • Understand how PHP scripts work, giving you confidence to adapt them to your own needs
  • Bring online forms to life, check required fields, and ensure user input is safe to process
  • ...
unlimited object storage image
Result Page: 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy