Mobile Application Development, Usability, and Security

The development of mobile technology has experienced exponential growth in recent years. Mobile devices are ubiquitous in modern society, impacting both our personal and professional lives. Mobile Application Development, Usability, and Security provides a thorough overview on the different facets of mobile technology management and its integration into modern society. Highlighting issues related to analytics, cloud computing, and different types of application development, this book is a pivotal reference source for professionals, researchers, upper-level students, and practitioners actively involved in the area of mobile computing.

Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center

Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective.

Glossary of Distributed Computing Terms 8th Ed: Updated for Windows 10, A+, Net+, Security+, and CCNA R&S, 5245 terms

Short (4-8 hour) course showing Java developers how to use Maven to create complex projects and manage dependencies using Eclipse 4.5 EE. Techniques work well in all versions of Eclipse 4 and Eclipse 4 EE, most work in Eclipse 3 with minor modifications..

Hacking: The Ultimate Beginners to Experts Guide to Computer Hacking, Penetration Testing and Basic Security Coding

Hacker and malicious activity has in the past few years been on the rise and this is specifically in the last one year. The attacks and threats have been on the rise and the impact to the online world is far-reaching. Attacks have been a source of concern to ordinary internet users and a problem too to corporate entities.

Instant Citrix Security How-to

A guide to bulletproofing your enterprise environment with the excellent security features in Citrix

Practical Hadoop Security 2014th Edition

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive study of how to implement defined security within a Hadoop cluster in a hands-on way.

Security and Resiliency Analytics for Smart Grids: Static and Dynamic Approaches 1st ed. 2016 Edition

This book targets the key concern of protecting critical infrastructures such as smart grids. It explains various static and dynamic security analysis techniques that can automatically verify smart grid security and resiliency and identify potential attacks in a proactive manner.


1 2 3 4 5 Last