 |
|
|
|
|
 Murach's Java Servlets and JSP, 2nd Edition
Ever since the late 1990s when Java servlets and JavaServer Pages (JSPs) came into widespread use, web site developers have been switching from CGI scripting languages to servlets and JSPs. As a result, there has been tremendous growth in the use of servlets and JSPs. Today, there's little doubt that scrvlet and JSP technology is here to... |  |  Modern Cryptography: Theory and PracticeLeading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents... |  |  Network Security with OpenSSLOpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. Focused on the... |
|
 Node.js Recipes: A Problem-Solution Approach
Node.js Recipes is your one-stop reference for solving Node.js problems. Filled with useful recipes that follow a problem/solution format, you can look up recipes for many situations that you may come across in your day-to-day server-side development.
Node.js is accessible to those who not only relish... |  |  Implementing SSL / TLS Using Cryptography and PKI
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security
If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or... |  |  Internet Security: Cryptographic Principles, Algorithms and ProtocolsCryptography is the key to securing the Internet
If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important... |
|
|
|
Result Page: 3 2 1 |