 |
|
 Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
It is a great pleasure for me to write this foreword about a book that comes out
of one of the first research projects funded by ANR, the French National Research
Agency. ANR was established by the French government in 2005 to fund research
projects, based on competitive schemes giving researchers the best opportunities to
realize... |  |  Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |  |  IBM WebSphere DataPower SOA Appliance Handbook
Expert Guide to Deploying, Using, and Managing DataPower SOA Appliances
IBM® WebSphere® DataPower® appliances can simplify SOA deployment, strengthen SOA security, enhance SOA performance, and dramatically improve SOA return on... |
|
|
 Effortless E-Commerce with PHP and MySQL
Electronic commerce has been an important and viable part of the Internet for well over a decade now. From the behemoths like Amazon.com to the mom-and-pop online stores, e-commerce is performed in a number of ways. Despite the dozen, or hundred, of failures for every single commercial success, e-commerce can still be an excellent business... |  |  Defensive Database Programming with SQL Server
Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment. Too often as... |  |  Secure Java: For Web Application Development
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure... |
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 |