Security Books



Bookstore > Books > Security

CentOS System Administration Essentials

CentOS System Administration Essentials

by Andrew Mallett

CentOS is widely respected as a very powerful and flexible Linux distribution, and it can be used as a web server, file server, FTP server, domain server, or a multirole solution. It is designed to handle the more demanding needs of business applications such as network and system administration, database management, and web services. CentOS is self-sufficient and fast while working, with the added benefit ...

Price:  $26.99  |  Publisher:  Packt Publishing  |  Release:  2014

Mastering Dart

Mastering Dart

by Sergey Akopkokhyants

Starting with a discussion about the basic features of Dart, we will dive into the more complicated concepts such as generics, annotation with reflection, errors and exceptions, which will help us improve our code. Moving on, you will learn how and when to create objects and also advanced techniques that will help you execute asynchronous code. You will also learn about the collection framework and how to c...

Price:  $48.58  |  Publisher:  Packt Publishing  |  Release:  2014

Learning iOS 8 for Enterprise

Learning iOS 8 for Enterprise

by Mayank Birani

iOS 8 is the biggest release for developers since the introduction of the App Store. iOS devices are widely used in enterprise environments, and iOS 8 is packed with new features for enterprises. With millions of iOS 8 devices out on the market, there is an ever-increasing demand for iOS 8 app developers.Learning iOS 8 for Enterprise starts off by showing you how to install Xcode and how to build your first...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2014

Resource Optimization and Security for Cloud Services

Resource Optimization and Security for Cloud Services

by Kaiqi Xiong

This book includes a study of trustworthiness, percentile response time, service availability, and authentication in the networks between users and cloud service providers, and at service stations or sites that may be owned by different service providers. The first part of the book contains an analysis of percentile response time, which is one of the most important SLA (service level agreements) metrics. Ef...

Price:  $89.23  |  Publisher:  Wiley  |  Release:  2014

Python Network Programming Cookbook

Python Network Programming Cookbook

by Dr. M. O. Faruque Sarker

This book highlights major aspects of network programming in Python starting from writing simple networking clients, to developing complex screen-scraping and network security monitoring scripts. It creates the building blocks for many practical web and networking applications that rely on various networking protocols. This book presents the power and beauty of Python in solving the numerous real-world task...

Price:  $26.99  |  Publisher:  Packt Publishing  |  Release:  2014

iPad and iPhone Kung Fu

iPad and iPhone Kung Fu

by Keir Thomas

A shortcut straight to power-user level with over 300 tips, tricks, hints, and hacks to make your Apple device the one thing you can't live without. Learn the secrets of FaceTime, Maps, Safari, and Mail. Transform your Apple device into a go-to office tool, as well as tighten security to deter theft. Designed to be dipped into, most tips in iPad and iPhone Kung Fu take only a minute to implement, but w...

Price:  $6.99  |  Publisher:  The Pragmatic Programmers  |  Release:  2014

Computer Security - ESORICS 2013

Computer Security - ESORICS 2013

by Jason Crampton, Sushil Jajodia, Keith Mayes

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoti...

Price:  $82.77  |  Publisher:  Springer  |  Release:  2013

Information Security The Complete Reference, 2nd Edition

Information Security The Complete Reference, 2nd Edition

by Mark Rhodes-Ousley

Today's complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, 2nd Edition is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspec...

Price:  $41.62  |  Publisher:  McGraw-Hill  |  Release:  2013

Hacking Exposed Mobile

Hacking Exposed Mobile

by Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures - so they can leverage the power of mobile platforms while ensuring that security risks are contained.Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobi...

Price:  $32.99  |  Publisher:  McGraw-Hill  |  Release:  2013

Hands-On Oracle Application Express Security

Hands-On Oracle Application Express Security

by Recx

As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications that are both fast and secure. However, as with any website, there is a security risk and threat, and securing APEX applications requires some specific knowledge of the fram...

Price:  $16.99  |  Publisher:  Wiley  |  Release:  2013

Pages: ←Previous | 1 ... 52, 53, 54, 55, 56 ... 74 | Next→

Subscribe to Newsletter

Be the first to know about new IT books, upcoming releases, exclusive offers and more.