The only end-to-end guide to securing Apache Web servers and Web applications
Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....
The papers in this book present, for the first time, the world of warfare, both defensive and offensive, from the Classical periods to end of the Middle Ages in one collection. These scholarships have attracted ancient writers and generals and nowadays historians, archaeologists and researchers poliorcetics. Military historiography and...
This one hundred page book focuses exclusively on how you can best use the ASP.NET MVC 4 Framework to build world-class REST services using the Web API. It sets aside much of what the ASP.NET MVC Framework can do, and focuses exclusively on how the Web API can help you build web services. You will not find any help on CSS, HTML, JavaScript,...
The ASP.NET MVC Framework has always been a good platform on which to implement REST-based services, but the introduction of the ASP.NET Web API Framework raised the bar to a whole new level.
Now in release version 2.1, the Web API Framework has evolved into a powerful and refreshingly usable platform. This concise book provides...
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.
Overview
Understand Android security from kernel to the application layer
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
There are many steps on the road from discovery of an anticancer drug to securing its final approval by the Food and Drug Administration. In this thoroughly updated and expanded second edition of the Handbook of Anticancer Pharmacokinetics and Pharmacodynamics, leading investigators synthesize an invaluable overview of the experimental...
Maximize the business value and flexibility of your SOA deployment
In this book, IBM Enterprise Integration Team experts present a start-to-finish guide to planning, implementing, and managing Service-Oriented Architecture. Drawing on their extensive experience helping enterprise customers migrate to SOA,...
Hardening is the process of protecting a system against unknown threats. System administrators harden against that which they think could be a threat. Administrators know the Internet is a hostile environment. Although they can't tell, for example, that a hacker will attempt to gain access to the SQL server next Tuesday, they can bet...