Security Smarts for the Self-Guided IT Professional “Get to know the hackers—or plan on getting hacked. Sullivan and Liu have …
Spring Security in Action shows you how to prevent cross-site scripting and request forgery attacks before they do damage. You’ll …
Spring Security in Action, Second Edition reveals the Spring Security techniques and tools you need to defend your apps against …
Design and develop Spring applications that are secure right from the start.In Spring Security in Action, Second Edition you will …
In 2011, a big corporation suffered a 23-day network outage after a breach of security that allowed the theft of …
Learn how to protect corporate information by properly designing, managing, and maintaining security at the database level Security is a …
SQL Server is the dominant relational database in the Windows market and data security is a huge and growing concern …
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic …
In this introductory textbook the author explains the key topics in cryptography. He takes a modern approach, where defining what …
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, …