Security for Web Developers
Hadoop Security
Spring Security 3
GlassFish Security
Cloud Computing and Security
Node Security
Hacking: Basic Security, Penetr ...
Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking ...
Security for Web Developers
As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provid ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
Network Security A Beginner’s G ...
Security Smarts for the Self-Guided IT ProfessionalDefend your network against a wide range of existing and emerging threats. Written by a Certified I ...
Hadoop Security
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponenti ...
Wireless Network Security A Beg ...
Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Ne ...
Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java ...
GlassFish Security
Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a ...
The Network Security Test Lab
The ultimate hands-on guide to IT security and proactive defenseThe Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT securit ...
Security and Privacy for Mobile ...
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile H ...
Cloud Management and Security
Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and d ...
Security and the Networked Soci ...
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, a ...
Network Security Assessment, 3r ...
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that prof ...
Handbook of Communications Secu ...
“Handbook of Communications Security” gives the reader information related to all aspects of communications security, from the fundamental concepts to ...
Enterprise Mac Security, 3rd Ed ...
Enterprise Mac Security is a definitive, expert-driven update of the popular, slash-dotted first edition which was written in part as a companion to t ...
Building a Home Security System ...
The Raspberry Pi is a powerful low-cost credit-card-sized computer, which lends itself perfectly as the controller for a sophisticated home security s ...
Resource Optimization and Secur ...
This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cl ...
Guide to Security Assurance for ...
This practical and didactic text/reference discusses the leading edge of secure cloud computing, exploring the essential concepts and principles, tool ...
Cloud Computing and Security
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 ...
IBM WebSphere Application Serve ...
For IBM WebSphere users, this is the complete guide to securing your applications with Java EE and JAAS security standards. From a far-ranging overvie ...
Microsoft Dynamics AX 2012 Secu ...
Securing ERP is the main issue nowadays; it is not only about bits and bytes of network traffic, but also about business transactions, users’ privileg ...
Intermediate Security Testing w ...
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defend ...
Information Security, 2nd Editi ...
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consume ...
Security and Privacy in Interne ...
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hack ...
Node Security
Node.js is a fast-growing platform for building server applications using JavaScript. Now that it is being more widely used in production settings, No ...