Search Results: 'application security'

Search

×
×
×
×
306 results for "application security"
Modeling and Simulation of Healthcare Systems for Homeland Security Applications By U.S. Department of Commerce et al.
Paperback: $17.49
Prints in 3-5 business days
Healthcare System models and simulations may be used to support analysis, planning, and training needs for the healthcare institutions, epidemics, and other healthcare-related emergencies. Simulation... More > models may be used to understand healthcare systems, interdependencies with other systems, their vulnerabilities, and the impact of emergency incidents on the population and healthcare community. These models and simulations will also be used to support training exercises, performance measurement, conceptual design, impact evaluation, response planning, analysis, acquisition, conceptualizing and evaluating new systems, vulnerability analysis, economic impact, and determining interdependencies between healthcare and other infrastructure systems. The goal of this document is to capture the current knowledge and information resources that can serve as a common baseline for researchers and developers of models and simulations of healthcare systems for homeland security applications.< Less
CONTEXTUALLY AWARE APPLICATION USAGE FOR SECURITY AND CRISIS MANAGEMENT By Avery Palos
Hardcover: $24.80
Prints in 3-5 business days
A framework for developing contextually aware applications.
CONTEXTUALLY AWARE APPLICATION USAGE FOR SECURITY AND CRISIS MANAGEMENT By Avery Palos
eBook (PDF): $12.50
A framework for developing contextually aware applications.
Application to LSE By Cassandra Thornton
Paperback: $25.00
Prints in 3-5 business days
A research inquiry into the relationship between art students, faculty and administration with student debt. Done over 3 months at California College of the Arts as national student debt reached $1... More > Trillion dollars, this wild exploration sets the stage for further research.< Less
Simple Security By The Simple Security Team
Paperback: $14.55
Prints in 3-5 business days
The book is intended for those relatively new to computers, those that don't consider themselves technically inclined and those that just want to get on with their job. Covering a wide range of... More > subjects, we hope to provide enough information for the typical reader to enjoy secure everyday use of email, the Internet and other applications. The preview file, SecuritySampler.pdf, can be used to directly access the references online. We'd recommend reading through the book first, then looking at each section in detail, checking the online references where necessary. Designed to be easy to read, with good sized type and plain layout. Written in plain english as far as possible, considering the subject matter. < Less
PHP Security By Pax Dickinson
Paperback: $9.90
Prints in 3-5 business days
"...In this book, I'll detail many of the common PHP programming mistakes that can result in security holes. By showing you what not to do, and how each particular flaw can be exploited, I... More > hope that you'll understand not just how to avoid these particular mistakes, but also why they result in security vulnerabilities. Understanding each possible flaw will help you avoid making the same mistakes in your PHP applications..."< Less
PHP Security By Pax Dickinson
eBook (PDF): $2.50
"...In this book, I'll detail many of the common PHP programming mistakes that can result in security holes. By showing you what not to do, and how each particular flaw can be exploited, I... More > hope that you'll understand not just how to avoid these particular mistakes, but also why they result in security vulnerabilities. Understanding each possible flaw will help you avoid making the same mistakes in your PHP applications..."< Less
The Dating Application By Celia Washington
Paperback: $15.00
Prints in 3-5 business days
We fill out paperwork for school, work, medical exams and loans. Our possessions are protected by insurance policies, alarms, burglar bars, bolt locks, dogs, fences, motion-sensors and firearms. But... More > when was the last time we filled out paperwork to protect our hearts? The heart is left wide open and defenseless. People who mean us no good bypass all of the protection with no questions asked and are able to ruin what we protect. We become like weak fortresses. We have walls up but for what? There are no checkpoints. TSA does a better job at security than we do. People are allowed entrance without proving themselves and we really don’t get to know them. We fall for their representatives. We fantasize about these fraudulent people who have sold us dreams that are nonexistent. The idea of love blinds and paralyzes us from asking the right questions. We meet, like, date, fall in love, marry and reproduce off of assumptions. We ignore yellow tape and red flags just to have companionship.< Less
Application Security Guide For CISOs v1.0 (Nov 2013) By OWASP Foundation
Paperback: $9.30
Prints in 3-5 business days
(2 Ratings)
Chief Information Security Officers (CISOs) are responsible for application security from governance, compliance and risk perspectives. The Application Security Guide For CISOs seeks to help CISOs... More > manage application security programs according to their own roles, responsibilities, perspectives and needs. Application security best practices and OWASP resources are referenced throughout the guide.< Less
Developing Dynamic PeopleSoft Field Security Applications: A PeopleSoft Developer’s Guide By Renita Rhodes
eBook (PDF): $9.99
A user manual that contains instructions on developing a dynamic field security application in PeopleSoft.

Top 10

see more >
 
 
 
2
API Security API Security By Lee Brandt et al.
Paperback: $19.00
 
 
3
 
 
 
 
 
 
7
BREATHE BREATHE By Sharon Boney Burge
Paperback: $31.48
 
 
9