Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Chess For Dummies
Chess For Dummies
It was inevitable, thank goodness, that the Dummies series would give us an introductory chess book. The light touch is perfect to offset the sober aura of mystery that surrounds the game in many people's minds. And the extras that reach beyond the well-written move explanations, strategies, and pattern-recognition make the book a real...
Implementing Domain-Driven Design
Implementing Domain-Driven Design

“For software developers of all experience levels looking to improve their results, and design and implement domain-driven enterprise applications consistently with the best current state of professional practice, Implementing Domain-Driven Design will impart a treasure trove of knowledge hard won within the DDD and...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
Network Perimeter Security:  Building Defense In-Depth
Network Perimeter Security: Building Defense In-Depth
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.

Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

Marketing Strategy Masterclass
Marketing Strategy Masterclass

The very best business isn’t born out of hunches, macho tactical skirmishing or simply ‘being busy’, but is the product of careful calculation and understanding customers’ needs, wants and aspirations. Marketing Strategy Masterclass is a ‘how to’ book of marketing strategy focused on doing what our...

Multicriteria Scheduling: Theory, Models and Algorithms
Multicriteria Scheduling: Theory, Models and Algorithms
Scheduling theory first appears in the mid 1950s. Since then the problems
addressed become closer to industrial applications, thus increasing in complexity.
The layout of the shops taken into account are closer and closer to
those met in practice: we encounter shops where the machines are found in
different multiple copies,
...
Mastering the Art of Equity Trading Through Simulation, + Web-Based Software: The TraderEx Course (Wiley Trading)
Mastering the Art of Equity Trading Through Simulation, + Web-Based Software: The TraderEx Course (Wiley Trading)

An interactive guide to successfully trading in today's markets

Mastering the Art of Equity Trading Through Simulation is a guidebook to interactive computer trading simulation designed to provide participants with hands-on experience in making tactical decisions and implementing them in different market...

Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy