- کتب و مجلات «608 عنوان»
- همه (885)
- مقاطع تحصیلی (1)
- کتب و مجلات (608)
- نرم افزار (266)
- فیلمهای آموزشی (11)
Security for Web Developers
Hadoop Security
Spring Security 3
GlassFish Security
Cloud Computing and Security
Building A Home Security System ...
Arduino is an open source micro-controller built on a single circuit board that is capable of receiving sensory input from the environment and control ...
CompTIA Security+ Training Kit
Ace your preparation for the skills measured by CompTIA Security+ Exam SY0-301. Work at your own pace through a series of lessons and reviews that ful ...
CCNA Security 210-260 Official ...
CCNA Security 210-260 Official Cert Guide CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specificall ...
Financial Cryptography and Data ...
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Secu ...
Maximum Linux Security, 2nd Edi ...
Linux continues to gain acceptance as a high-level operating system that’s ready for serious corporate enterprise-level computing. When running Intern ...
Hacking: Basic Security, Penetr ...
Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking ...
Security for Web Developers
As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provid ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
Network Security A Beginner’s G ...
Security Smarts for the Self-Guided IT ProfessionalDefend your network against a wide range of existing and emerging threats. Written by a Certified I ...
Hadoop Security
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponenti ...
Wireless Network Security A Beg ...
Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Ne ...
Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java ...
GlassFish Security
Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a ...
The Network Security Test Lab
The ultimate hands-on guide to IT security and proactive defenseThe Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT securit ...
Security and Privacy for Mobile ...
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile H ...
Cloud Management and Security
Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and d ...
Security and the Networked Soci ...
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, a ...
Network Security Assessment, 3r ...
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that prof ...
Handbook of Communications Secu ...
“Handbook of Communications Security” gives the reader information related to all aspects of communications security, from the fundamental concepts to ...
Enterprise Mac Security, 3rd Ed ...
Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to t ...
Building a Home Security System ...
The Raspberry Pi is a powerful low-cost credit-card-sized computer, which lends itself perfectly as the controller for a sophisticated home security s ...
Resource Optimization and Secur ...
This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cl ...
Guide to Security Assurance for ...
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tool ...
Cloud Computing and Security
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 ...
IBM WebSphere Application Serve ...
For IBM WebSphere users, this is the complete guide to securing your applications with Java EE and JAAS security standards. From a far-ranging overvie ...