This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...
The present volume contains the proceedings of the seventh international workshop on Formal Aspects of Security and Trust (FAST 2010), held in Pisa, Italy, 16–17 September 2010, as part of the 8th IEEE International Conference on Software Engineering and Formal Methods (SEFM 2010).
Storage technologies have fundamentally changed the landscape
of digital media in a profound way. Gone are the days of using
a single hard disk drive on a workstation as the sole means to
store digital content. Nearly vanished is the practice of capturing
video and audio only on videotape. The practice of transferring
videotape...
CompTIA® Network+ N10-005 Authorized Exam Cram, Fourth Edition is the perfect study guide to help you pass CompTIA’s new Network+ N10-005 exam. It provides coverage and practice questions for...
Ostensibly, you buy a computer or gadget to get something done. The something might be as
simple as listening to MP3s you’ve ripped from your CD collection or as challenging as creating
a full-length feature film. Apple is happy to sell you products to meet your needs. The trouble is
your needs aren’t...
People are often concerned with the reliability of products they use and of the
friends and associates with whom they interact daily in a myriad of ways. Although
the term “reliability” may not occur in the description of a given product
or interaction, it is often the attribute that the individual means in expression of...
Java Examples in a Nutshell is full of real-world Java programming examples. The second edition of this bestselling book covers Java 1.3 and contains 164 complete, practical programs: over 17,900 lines of densely commented, professionally written Java code covering 20 distinct Java APIs, including Servlets, JavaServer Pages,...
The Definitive Guide to Protecting Enterprise Data
Your enterprise data is your most critical asset. If it's compromised, your business can be destroyed. Don't let that happen-leverage today's state-of-the-art strategies, best practices, and technologies and protect your critical information. In...
The release of Microsoft Content Management Server (MCMS) Service Pack 2 opens up the world of ASP.NET 2.0 to MCMS developers. Written by the masters of MCMS, this book shows you how to use the new features of ASP.NET 2.0 that everyone is talking about in your MCMS development. You will first learn how to install and configure MCMS SP2. There are...
A timely reference in the innovative and cutting-edge field of multimedia security!
Digital Rights Management (DRM) defines a set of tools that manage the secured use of digital media content found on static and mobile electronic devices, ranging from personal computers and PDAs to digital video recorders and MP3...
The Firebird Book: A Guide for Database Developers is a comprehensive, practical guide for developing client/server FirebirdSQL database applications for small and large networks of users. FirebirdSQL is an open source database, and while not as popular as MySQL or PostgreSQL, it has a dedicated following, and has far more advanced features.
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities
More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...