-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
GlassFish Security
Spring Security 3
Hadoop Security
Security for Web Developers
Mobile Application Security
Security Intelligence
Network Security Assessment, 3r ...
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tools and techniques that prof ...
Security and the Networked Soci ...
This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, a ...
Cloud Management and Security
Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and d ...
Security and Privacy for Mobile ...
This book examines state-of-art research on designing healthcare applications with the consideration of security and privacy. It explains the Mobile H ...
The Network Security Test Lab
The ultimate hands-on guide to IT security and proactive defenseThe Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT securit ...
GlassFish Security
Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a ...
Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java ...
Wireless Network Security A Beg ...
Security Smarts for the Self-Guided IT ProfessionalProtect wireless networks against all real-world hacks by learning how hackers operate. Wireless Ne ...
Hadoop Security
As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponenti ...
Network Security A Beginner’s G ...
Security Smarts for the Self-Guided IT ProfessionalDefend your network against a wide range of existing and emerging threats. Written by a Certified I ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
Security for Web Developers
As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provid ...
Hacking: Basic Security, Penetr ...
Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking ...
Maximum Linux Security, 2nd Edi ...
Linux continues to gain acceptance as a high-level operating system that’s ready for serious corporate enterprise-level computing. When running Intern ...
Financial Cryptography and Data ...
This book constitutes the thoroughly refereed post-conference proceedings of the 18th International Conference on Financial Cryptography and Data Secu ...
CCNA Security 210-260 Official ...
CCNA Security 210-260 Official Cert Guide CCNA Security 210-260 Official Cert Guide is a best-of-breed Cisco exam study guide that focuses specificall ...
CompTIA Security+ Training Kit
Ace your preparation for the skills measured by CompTIA Security+ Exam SY0-301. Work at your own pace through a series of lessons and reviews that ful ...
Building A Home Security System ...
Arduino is an open source micro-controller built on a single circuit board that is capable of receiving sensory input from the environment and control ...
Mobile Application Security
Secure today’s mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this p ...
Implementing Cisco IOS Network ...
Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second EditionFoundation learning for the CCNA Security IINS 640-554 exam Imp ...
Cyber Security: Analytics, Tech ...
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation ...
Visual Cryptography for Image P ...
This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application ...
Railway Infrastructure Security
This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railw ...
Security in Wireless Sensor Net ...
This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to ...
Security Intelligence
Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through ...