Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that...
Intrusion Detection in Wireless Ad-Hoc Networks
Intrusion Detection in Wireless Ad-Hoc Networks

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including...

Refactoring to Patterns (The Addison-Wesley Signature Series)
Refactoring to Patterns (The Addison-Wesley Signature Series)

In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns, Joshua...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Securing PHP Apps
Securing PHP Apps

Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.

Is your PHP app truly secure? Let's make sure you get home...

Oracle 12c: SQL
Oracle 12c: SQL

Now you can master the latest version of the fundamental SQL language used in all relational databases today with ORACLE 12C: SQL, 3E. Much more than a study guide, this edition helps you transform a basic knowledge of databases into proficiency with the latest SQL and Oracle concepts and techniques. You learn to use Oracle 12c SQL most...

Access 2007 VBA Programmer's Reference
Access 2007 VBA Programmer's Reference
Access 2007 VBA Programmer's Reference

Written by Access MVPs and Microsoft Access testers, this resource will give you the tools to leverage Access 2007's built-in functionality and VBA in order to build more dynamic applications. It explores all aspects of VBA programming for Access and describes the latest innovations. You'll also find...

The Art of Agile Development
The Art of Agile Development

The Art of Agile Development contains practical guidance for anyone considering or applying agile development for building valuable software. Plenty of books describe what agile development is or why it helps software projects succeed, but very few combine information for developers, managers, testers, and customers into a single...

Digital Image Forensics: There is More to a Picture than Meets the Eye
Digital Image Forensics: There is More to a Picture than Meets the Eye

Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Professional ASP.NET 2.0 Security, Membership, and Role Management (Wrox Professional Guides)
Professional ASP.NET 2.0 Security, Membership, and Role Management (Wrox Professional Guides)
ASP.Net security covers a broad range of subjects. Concepts such as Web security features, developing in partial trust, forms authentication, and securing configuration - just to name a few p are all integral components to helping developers ensure reliable security. Addressing the ASP.NET security features from the developer's point of view, this...
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy