|
|
|
|
|
|
BSD HacksLooking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources. If... | | Application Development Using Visual Basic and .NETBuild industrial-strength .NET applications with Visual Basic.
- Experienced programmers: Quickly come up to speed on the new, powerful Visual Basic .NET
- Practical, hands-on coverage of the .NET Framework, CLR, ADO.NET, ASP.NET, Web services, security, interoperability, and more
- Running case study:...
| | |
|
| | Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from
reading your files, and cryptography that will stop major governments from reading your files. This
book is about the latter.
If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the... | | Node Security
Take a deep dive into the world of securing your Node applications with Node Security
Overview
-
Examine security features and vulnerabilities within JavaScript
-
Explore the Node platform, including the event-loop and core modules
-
Solve common security problems with available...
|
|
|
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 |