0 - 500
0
500

A Course in Derivative Securities: Introduction to Theory and Computation (Springer Finance)

A Course in Derivative Securities: Introduction to Theory and Computation (Springer Finance)

“Deals with pricing and hedging financial derivatives.… Computational methods are introduced and the text contains the Excel VBA routines corresponding to the formulas and procedures described in the book. This is valuable since computer simulation can help readers understand the theory….The book…succeeds in presenting intuitively advanced derivative modelling… it provides a useful bridge between introductory…

OAuth 2.0 Cookbook: Protect your web applications using Spring Security

OAuth 2.0 Cookbook: Protect your web applications using Spring Security

Key FeaturesInteract with public OAuth 2.0 protected APIs such as Facebook, LinkedIn and Google.Use Spring Security and Spring Security OAuth2 to implement your own OAuth 2.0 providerLearn how to implement OAuth 2.0 native mobile clients for Android applicationsBook DescriptionOAuth 2.0 is a standard protocol for authorization and focuses on client development simplicity while providing specific…

Windows Performance Analysis Field Guide

Windows Performance Analysis Field Guide

Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who…

Managing Security with Snort and IDS Tools

Managing Security with Snort and IDS Tools

Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you’re under increasing pressure to ensure that mission-critical systems are safe–in fact impenetrable–from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders…

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services. Book & CD

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services. Book & CD

Rigorously test and improve the security of all your Web software!   It’s as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. If you’re vulnerable, you’d better discover these attacks yourself, before the black hats do. Now, there’s a definitive, hands-on guide to security-testing any Web-based software: How…

Windows Server 2003 Security Cookbook: Security Solutions and Scripts for System Administrators (Cookbooks (O’Reilly))

Windows Server 2003 Security Cookbook: Security Solutions and Scripts for System Administrators (Cookbooks (O’Reilly))

In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you…

MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server(TM) 2003 Network (Microsoft Press Training Kit)

MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft Windows Server(TM) 2003 Network (Microsoft Press Training Kit)

Ace your preparation for the skills measured by MCP Exam 70-298—and on the job—with this official Microsoft study guide. Work at your own pace through a system of lessons, practice exercises, and design activities. The Readiness Review Suite on CD, featuring advanced technology from MeasureUp, provides 300 challenging questions for in-depth self-assessment and practice. You…

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast

Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad hoc…

Hardening Linux

Hardening Linux

*Imparts good security doctrine, methodology, and strategies *Each application-focused chapter will be able to be used as a stand-alone HOW-TO for that particular application. *Offers users a selection of resources (websites, mailing lists, and books) to further their knowledge. Used Book in Good Condition