0 - 500
0
500

Handbook of Database Security: Applications and Trends

Handbook of Database Security: Applications and Trends

Handbook of Database Security: Applications and Trends provides an up-to-date overview of data security models, techniques, and architectures in a variety of data management applications and settings. In addition to providing an overview of data security in different application settings, this book includes an outline for future research directions within the field. The book is…

Server Security A Complete Guide – 2019 Edition

Server Security A Complete Guide – 2019 Edition

What potential environmental factors impact the Server Security effort? How do senior leaders actions reflect a commitment to the organizations Server Security values? Will Server Security have an impact on current business continuity, disaster recovery processes and/or infrastructure? What vendors make products that address the Server Security needs? What situation(s) led to this Server Security…

RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations (Wireless Networks and Mobile Communications)

RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations (Wireless Networks and Mobile Communications)

The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there has been a need for…

MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298

MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298

MCSE Designing Security for a Microsoft Windows Server 2003 Network (Exam 70-298) Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft 70-298 exam objectives plus test preparation software for the edge you…

OAuth 2 in Action

OAuth 2 in Action

Summary OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You’ll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer. Purchase of the print book includes…

Innocent Code: A Security Wake-Up Call for Web Programmers

Innocent Code: A Security Wake-Up Call for Web Programmers

This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or application-and how best to fix them Based on real-world situations taken from the author’s experiences of tracking coding mistakes at major financial institutions Covers SQL injection attacks, cross-site scripting, data manipulation in…

Modernizing the Datacenter with Windows Server and Hybrid Cloud (IT Best Practices – Microsoft Press)

Modernizing the Datacenter with Windows Server and Hybrid Cloud (IT Best Practices – Microsoft Press)

Transform your datacenter for breakthrough flexibility, agility, and scalability! Using public, private, and hybrid cloud services, you can transform your datacenter to serve fast-changing workloads, process and analyze enormous amounts of data, and achieve unprecedented flexibility and value. In this guide, two world-renowned experts in Microsoft datacenter technology show how to effectively leverage current legacy…