Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Commerce Security: Design and Development
Web Commerce Security: Design and Development

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems.

Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during...

No Fear Finance: An Introduction to Finance and Investment for the Non-finance Professional
No Fear Finance: An Introduction to Finance and Investment for the Non-finance Professional

Many people are too apprehensive of the perceived risk to invest and too intimidated by the complicated jargon to consider finance. No Fear Finance is an accessible guide to the essentials of finance and investment for students approaching the subject for the first time or professionals looking to gain new skills.

Guy
...

Magento 2 - Build World-Class online stores
Magento 2 - Build World-Class online stores

Create rich and compelling solutions for Magento 2 by developing and implementing solutions, themes, and extensions

About This Book

  • Be proficient in the main functionalities, resources, and system structure of Magento 2
  • Get to grips with this practical and hands-on guide to raise your web...
Algebraic Shift Register Sequences
Algebraic Shift Register Sequences

Pseudo-random sequences are essential ingredients of every modern digital communication system including cellular telephones, GPS, secure internet transactions and satellite imagery. Each application requires pseudo-random sequences with specific statistical properties. This book describes the design, mathematical analysis and implementation...

Java 9 Programming Blueprints
Java 9 Programming Blueprints

Key Features

  • See some of the new features of Java 9 and be introduced to parts of the Java SDK
  • This book provides a set of diverse, interesting projects that range in complexity from fairly simple to advanced and cover HTTP 2.0
  • Take advantage of Java's new modularity features to write...
Pivotal Certified Professional Spring Developer Exam: A Study Guide
Pivotal Certified Professional Spring Developer Exam: A Study Guide

Pass the Pivotal Certified Professional exam using source code examples, study summaries, and mock exams. In this book, you'll find a descriptive overview of certification-related Spring modules and a single example application demonstrating the use of all required Spring modules. Also, it is suitable as an introductory primer for Spring...

C++/CLI Primer: For .NET Development
C++/CLI Primer: For .NET Development

Enter a world of hardcore back-end, server-side enterprise programming on the .NET platform. This book presents some of the important aspects of the C++/CLI language that often become a barrier preventing programmers from exploring further. The C++/CLI Primer is a powerful but compact book that will guide you through that...

iOS Penetration Testing: A Definitive Guide to iOS Security
iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure. 

When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to
...
Splunk Operational Intelligence Cookbook
Splunk Operational Intelligence Cookbook

Over 70 practical recipes to gain operational data intelligence with Splunk Enterprise

About This Book

  • Learn how to use Splunk to effectively gather, analyze, and report on the operational data across your environment
  • Expedite your operational intelligence reporting, be empowered to...
Transactions on Petri Nets and Other Models of Concurrency VIII (Lecture Notes in Computer Science)
Transactions on Petri Nets and Other Models of Concurrency VIII (Lecture Notes in Computer Science)

The 8th volume of ToPNoC contains revised and extended versions of a selection of the best workshop papers presented at the 33rd International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (Petri Nets 2012). The 10 papers cover a diverse range of topics including model checking and system verification,...

Spring in Practice: Covers Spring 3
Spring in Practice: Covers Spring 3

Summary

Spring in Practice shows you how to tackle the challenges you face when you build Spring-based applications. The book empowers software developers to solve concrete business problems by mapping application-level issues to Spring-centric solutions. It diverges from other cookbooks because it presents...

Under Attack
Under Attack

The wording "Under Attack" implies a dangerous situation - one that signifies we are currently under assault. In this book, the Celebrity Experts® showcased are in the vanguard of protecting data and sensitive information under threat - the threat of digital information being made available to unscrupulous sources, and at times...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy