- کتب و مجلات «608 عنوان»
- همه (885)
- مقاطع تحصیلی (1)
- کتب و مجلات (608)
- نرم افزار (266)
- فیلمهای آموزشی (11)
GlassFish Security
Spring Security 3
Hadoop Security
Security for Web Developers
Mobile Application Security
Cloud Computing and Security
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 ...
Guide to Security Assurance for ...
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tool ...
Resource Optimization and Secur ...
This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cl ...
Building a Home Security System ...
The Raspberry Pi is a powerful low-cost credit-card-sized computer, which lends itself perfectly as the controller for a sophisticated home security s ...
Enterprise Mac Security, 3rd Ed ...
Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to t ...
Handbook of Communications Secu ...
“Handbook of Communications Security” gives the reader information related to all aspects of communications security, from the fundamental concepts to ...
Network Security Assessment, 3r ...
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that prof ...
Security and the Networked Soci ...
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, a ...
Cloud Management and Security
Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and d ...
Security and Privacy for Mobile ...
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile H ...
The Network Security Test Lab
The ultimate hands-on guide to IT security and proactive defenseThe Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT securit ...
GlassFish Security
Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a ...
Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java ...
Wireless Network Security A Beg ...
Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Ne ...
Hadoop Security
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponenti ...
Network Security A Beginner’s G ...
Security Smarts for the Self-Guided IT ProfessionalDefend your network against a wide range of existing and emerging threats. Written by a Certified I ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
Security for Web Developers
As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provid ...
Hacking: Basic Security, Penetr ...
Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking ...
Maximum Linux Security, 2nd Edi ...
Linux continues to gain acceptance as a high-level operating system that’s ready for serious corporate enterprise-level computing. When running Intern ...
Financial Cryptography and Data ...
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Secu ...
CCNA Security 210-260 Official ...
CCNA Security 210-260 Official Cert Guide CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specificall ...
CompTIA Security+ Training Kit
Ace your preparation for the skills measured by CompTIA Security+ Exam SY0-301. Work at your own pace through a series of lessons and reviews that ful ...
Building A Home Security System ...
Arduino is an open source micro-controller built on a single circuit board that is capable of receiving sensory input from the environment and control ...
Mobile Application Security
Secure today’s mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this p ...