Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Teach Yourself VISUALLY Windows Vista (Tech)
Teach Yourself VISUALLY Windows Vista (Tech)
Are you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 140 Windows Vista tasks. Each task-based spread includes easy, visual directions for...
PostgreSQL Administration Cookbook, 9.5/9.6 Edition
PostgreSQL Administration Cookbook, 9.5/9.6 Edition

Over 150 recipes to help you administer your PostgreSQL database more efficiently

About This Book

  • Get to grips with the capabilities of PostgreSQL 9.6 to administer your database more efficiently
  • Monitor, tune, secure and protect your database
  • A step-by-step, recipe-based...
ASP.NET 2.0 Illustrated (Microsoft .Net Development Series)
ASP.NET 2.0 Illustrated (Microsoft .Net Development Series)

Developers moving to ASP.NET 2.0, the breakthrough Web development environment from Microsoft, will want to learn how to take full advantage of the new features that make this the most productive and powerful Web development environment ever. ASP.NET 2.0 Illustrated teaches developers exactly what they need to know to...

Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications
Security in Fixed and Wireless Networks: An Introduction to Securing Data Communications

With our modern society' s increased dependence on information technology and communication networks, the subject of network security is developing into a crucial base technology and most people working in the networking and information technology business will need to know the basics of fixed and wireless network security.? This...

Mastering Web Services Security
Mastering Web Services Security
Quickly learn how to build a secure Web services system using available programming tools, models, and specifications

Web services promise to simplify business programming and to improve interoperability, but they won’t deliver on these promises without effective security. Written by the leading security experts in the field, this...

Professional Microsoft PowerPivot for Excel and SharePoint
Professional Microsoft PowerPivot for Excel and SharePoint

With PowerPivot, Microsoft brings the power of Microsoft's business intelligence tools to Excel and SharePoint users. Self-service business intelligence today augments traditional BI methods, allowing faster response time and greater flexibility. If you're a business decision-maker who uses Microsoft Office or an IT professional...

Securing Your Internet Life: A Step By Step Guide to Secure Yourself Online
Securing Your Internet Life: A Step By Step Guide to Secure Yourself Online

It’s a well-known fact that scouring through the online world not just conveys accommodation to the world all in all, however there are numerous things that you can do online today that you couldn't do a few years prior. Not just would you be able to now shop online for all intents and purposes anything that you require, yet you can...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

Cryptography for Internet & Database Applications
Cryptography for Internet & Database Applications
Cryptography is the gold standard for security. It is used to protect the transmission and storage of data between two parties by encrypting it into an unreadable format. Cryptography has enabled the first wave of secure transmissions, which has helped fuel the growth of transactions like shopping, banking, and finance over the world's biggest...
The Tangled Web: A Guide to Securing Modern Web Applications
The Tangled Web: A Guide to Securing Modern Web Applications
Just fifteen years ago, the Web was as simple as it was unimportant: a quirky mechanism that allowed a handful of students, plus a bunch of asocial, basementdwelling geeks, to visit each other’s home pages dedicated to science, pets, or poetry. Today, it is the platform of choice for writing...
BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs.

API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business functionalities to the outside world....

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy