Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Your Ecommerce Site
Hack Proofing Your Ecommerce Site
Hack Proofing Your E-Commerce Site was written in response to requests from readers of our first book, Hack Proofing Your Network: Internet Tradecraft. Many of you asked us for more detail on how to protect e-commerce sites, given the unique risk and exposure such...
Xbox 360В For Dummies (For Dummies (Computer/Tech))
Xbox 360В For Dummies (For Dummies (Computer/Tech))
Microsoft's Xbox now accounts for 37 percent of the game console market, and the new Xbox 360 is due out for the 2005 holiday season, months before Sony's PlayStation 3. When gamers take the new Xbox home, however, they'll soon discover that it's more than a just a game machine-it's a full-fledged home media hub with more power than most PCs. This...
Securing Wireless Communications at the Physical Layer
Securing Wireless Communications at the Physical Layer

The book focuses on a recently emerging topic in security. Specifically, the book focuses on physical layer security. Whereas conventional security mechanisms involve cryptography that operates at higher layers of the protocol stack, the methods described in this book secure communications at the physical layer.

The area of physical...

Financial Cryptography and Data Security: 15th International Conference, FC 2011
Financial Cryptography and Data Security: 15th International Conference, FC 2011

This volume contains the proceedings of the 15th International conference on Financial Cryptography and Data Security, held at the Bay Gardens Beach Resort, St. Lucia, February 28–March 4, 2011.

Financial cryptography and data security (FC) is a well-established international forum for research, advanced development,...

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Pro SQL Azure (Expert's Voice in .NET)
Pro SQL Azure (Expert's Voice in .NET)

SQL Azure represents Microsoft’s cloud-based delivery of its enterprise-caliber, SQL Server database management system (formerly under the code name "Oslo"). Pro SQL Azure introduces you to this new platform, showing you how to program and administer it in a variety of cloud computing scenarios. You’ll learn to...

Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Pro Business Applications with Silverlight 4
Pro Business Applications with Silverlight 4

Silverlight 4 has the potential to revolutionize the way we build business applications. With its flexibility, web deployment, cross-platform capabilities, rich .NET language support on the client, rich user interface control set, small runtime, and more, it comes close to the perfect platform in which to build business applications. It's...

Administering and Securing the Apache Server
Administering and Securing the Apache Server

Apache is the most popular Web server in the world, hosting 50 percent of all Web sites! With Apache, you will get excellent performance at a low cost. The server, plus all of its source code, is freely available and you can modify it to your specific needs. With this book, you will learn how to install, configure, and troubleshoot the Apache...

Enterprise Security: The Manager's Defense Guide
Enterprise Security: The Manager's Defense Guide

E-Business is on the rise, but so are the likelihood and severity of computer attacks. Melissa, the Love Bug, Nimda, and Reezak all caught the e-Business community off guard, costing billions of dollars in lost productivity and damage. Maintaining enterprise security is now, without question, a crucial aspect of doing business in today's...

The Principles of Clinical Cytogenetics
The Principles of Clinical Cytogenetics
In the summer of 1989, one of us (SLG), along with his mentor, Dorothy Warburton, attended the Tenth International Workshop on Human Gene Mapping. The meeting was held at Yale University in celebration of the first such event, which also took place there.

This meeting was not open to the general public; one had to
...
Security in Distributed, Grid, Mobile, and Pervasive Computing
Security in Distributed, Grid, Mobile, and Pervasive Computing
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy