Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...

Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

Cryptography for Dummies
Cryptography for Dummies

Protect yourself and your business from online eavesdroppers—it’s easier than you think! If you were hoping for a flame-throwing watch or flying a car, we’re sorry—this isn’t James Bond’s equipment manual. Cryptography is a common-sense way to secure stuff on the Internet, and this friendly guidebook makes...

JBoss EAP6 High Availability
JBoss EAP6 High Availability

From the basic uses of JBoss EAP6 through to advanced clustering techniques, this book is the perfect way to learn how to achieve a system designed for high availability. All that's required is some basic knowledge of Linux/Unix.

Overview

  • A thorough introduction to the new domain mode provided by...
Building an e-Commerce Application with MEAN
Building an e-Commerce Application with MEAN

Develop an end-to-end, real-time e-commerce application using the MEAN stack

About This Book

  • Build all the main components of an e-commerce website and extend its high-quality features as per your needs
  • Get to grips with the full-stack JavaScript to build attractive e-commerce sites and...
Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Internet Security: Cryptographic Principles, Algorithms and Protocols
Internet Security: Cryptographic Principles, Algorithms and Protocols
Cryptography is the key to securing the Internet

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...

Cloud Computing, A Practical Approach
Cloud Computing, A Practical Approach

"The promise of cloud computing is here. These pages provide the 'eyes wide open' insights you need to transform your business." --Christopher Crowhurst, Vice President, Strategic Technology, Thomson Reuters

A Down-to-Earth Guide to Cloud Computing

Cloud Computing: A Practical Approach provides...

Practical Load Balancing: Ride the Performance Tiger
Practical Load Balancing: Ride the Performance Tiger
The Internet, and in particular the World Wide Web, have effectively leveled the playing field for businesses and individuals around the world. Do you have a great idea for a web site or a service? Even the more advanced ideas can be relatively easily and cheaply realized without much in the way of initial outlay. You can get...
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy