TouchDevelop, 3rd Edition
Database Nation
Crackproof Your Software
Computer Viruses For Dummies
Network Security Bible
PGP & GPG
Security Power Tools
Security Metrics
Securing VoIP Networks
Securing Ajax Applications
Rootkits For Dummies
Hacking Exposed Web 2.0
Hacking, 2nd Edition
Hacking VoIP
Windows Phone 7.5 Application D ...
Windows Phone is an OS which is also a platform in itself and provides an opportunity for application developers to build their apps and sell them on ...
TouchDevelop, 3rd Edition
This book walks you through all of the screens of the TouchDevelop app, and itpoints out similarities and differences of the TouchDevelop language com ...
Pro Windows Phone App Developme ...
The Windows Phone 8 platform provides a remarkable opportunity for Windows developers to create state-of-the-art mobile applications using their exist ...
Applied Cryptography, 2nd Editi ...
This new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and ele ...
Database Nation
As the 21st century begins, advances in technology endanger our privacy in ways never before imagined. This newly revised update of the popular hardco ...
The Fundamentals of Network Sec ...
Here’s a practical book that introduces fundamental network security concepts, principles, and terms. It helps you identify the best type of intrusion ...
Network Security with OpenSSL
OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide ava ...
Crackproof Your Software
This essential resource for software developers highlights the weak points in “well-protected” software, shows how crackers break common protection sc ...
Computer Viruses For Dummies
Computer viruses – just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in com ...
Network Security Bible
* A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of sec ...
PGP & GPG
OpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Privacy) as originally developed by Phil Zimme ...
Network Security Hacks, 2nd Edi ...
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network ...
Disassembling Code: IDA Pro and ...
This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level languages and recognize di ...
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security P ...
Security Metrics
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample ...
Securing VoIP Networks
In Securing VoIP Networks,two leading experts systematically review the security risks and vulnerabilities associated with VoIP networks and offer pro ...
Securing Ajax Applications
Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed r ...
Rootkits For Dummies
A rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system’s ...
Network Security Assessment, 2n ...
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-base ...
Hacking Exposed Web 2.0
Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web ...
Web Security Testing Cookbook
Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most neglected. The recipes in the ...
Reverse Engineering Code with I ...
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. H ...
Hacking, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sl ...
Hacking VoIP
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet a ...
Hacking Exposed Linux, 3rd Edit ...
This authoritative guide will help you secure your Linux network – whether you use Linux as a desktop OS, for Internet services, for telecommunication ...