Moodle Security
Beginning ASP.NET Security
Pro ASP.NET Web API Security
Android Apps Security
Network Security Bible
Security Power Tools
Security Metrics
The Myths of Security
Security Monitoring
Cloud Security and Privacy
Beautiful Security
Expert Oracle and Java Security
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database appl ...
Hands-On Oracle Application Exp ...
As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle da ...
Expert Oracle Application Expre ...
Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings ...
Microsoft SQL Server 2012 Secur ...
Over 70 practical, focused recipes to bullet-proof your SQL Server database and protect it from hackers and security threats Practical, focused recipe ...
Moodle Security
Moodle Security will show you how to make sure that only authorized users can access the information on your Moodle site. This may seem simple, but, e ...
Professional ASP.NET 3.5 Securi ...
ASP.NET security covers concepts such as Web security, developing in partial trust, forms authentication, and securing configurationÂjust to name a f ...
Beginning ASP.NET Security
Beginning ASP.NET Security is for novice to intermediate ASP.NET programmers and provides a step-by-step solution to securing each area of ASP.NET dev ...
Pro ASP.NET Web API Security
ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of device ...
Microsoft Windows XP Networking ...
Dig into Windows XP – and discover how you can really put its networking and security features to work! Also covering Windows 2000, this supremely org ...
Application Security for the An ...
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you n ...
Android Apps Security
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can ...
The Fundamentals of Network Sec ...
Here’s a practical book that introduces fundamental network security concepts, principles, and terms. It helps you identify the best type of intrusion ...
Network Security with OpenSSL
OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide ava ...
Network Security Bible
* A must for working network and security professionals as well as anyone in IS seeking to build competence in the increasingly important field of sec ...
Network Security Hacks, 2nd Edi ...
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network ...
Security Power Tools
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security P ...
Security Metrics
Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise. Using sample ...
Network Security Assessment, 2n ...
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-base ...
Web Security Testing Cookbook
Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most neglected. The recipes in the ...
The Myths of Security
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional ...
Security Monitoring
How well does your enterprise stand up against today’s sophisticated security threats? In this book, security experts from Cisco Systems demonstrate h ...
Cloud Security and Privacy
You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? No ...
Beautiful Security
In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems i ...
Enterprise Mac Security: Mac OS ...
A common misconception in the Mac community is that Mac’s operating system is more secure than others. While this might be true in certain cases, secu ...
BackTrack 4: Assuring Security ...
BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testi ...