Identity and Data Security for Web Development: Best Practices
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...
Beginning Cryptography with Java Beginning Cryptography with Java
While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.
This book teaches you how. Chapters one through...
Cryptography for Dummies
Protect yourself and your business from online eavesdroppers—it’s easier than you think! If you were hoping for a flame-throwing watch or flying a car, we’re sorry—this isn’t James Bond’s equipment manual. Cryptography is a common-sense way to secure stuff on the Internet, and this friendly guidebook makes...
JBoss EAP6 High Availability
From the basic uses of JBoss EAP6 through to advanced clustering techniques, this book is the perfect way to learn how to achieve a system designed for high availability. All that's required is some basic knowledge of Linux/Unix.
A thorough introduction to the new domain mode provided by...
Building an e-Commerce Application with MEAN
Develop an end-to-end, real-time e-commerce application using the MEAN stack
About This Book
Build all the main components of an e-commerce website and extend its high-quality features as per your needs
Android Security Cookbook
Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems...
Internet Security: Cryptographic Principles, Algorithms and Protocols Cryptography is the key to securing the Internet
If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...
Cloud Computing, A Practical Approach
"The promise of cloud computing is here. These pages provide the 'eyes wide open' insights you need to transform your business." --Christopher Crowhurst, Vice President, Strategic Technology, Thomson Reuters
A Down-to-Earth Guide to Cloud Computing
Cloud Computing: A Practical Approach provides...
Practical Load Balancing: Ride the Performance Tiger
The Internet, and in particular the World Wide Web, have effectively leveled the playing field for
businesses and individuals around the world. Do you have a great idea for a web site or a service? Even
the more advanced ideas can be relatively easily and cheaply realized without much in the way of initial
outlay. You can get...
|Result Page: 11 10 9 8 7 6 5 4 3 2 |