Search Results: 'web security'

Search

×
×
×
×
254 results for "web security"
"110 pages on cyber attacks"-"are we really secure" By Prithviraj Gohel & Dixita Raiyani
eBook (PDF): $0.00
(1 Ratings)
As the usage of technology increased from centuries to centuries it gave benefits to mankind, yet as there is two sides of everything technology also has its good and bad side which depends on how it... More > is used either for construction or for destruction. No doubt there are people who misuse it. We are talking about the increasing amount of “Cyber Attacks” happening rapidly. From the time the computer especially the internet era began people learnt about hacking i.e. to enter another person’s system illegally and from which cyber-attacks took birth. All this made me compelled to write “150 pages of cyberattacks” because my fellow humans should also be aware about different cyber-attacks. It will make people aware about different hacking attacks and everyone including your little ones could know from learning phase so their future will get secured and they are already prepared if any future cyber-attacks affect the world< Less
Bulk Capable: Part 1 of the Watchers Trilogy By W.E.B. Fox
eBook (ePub): $4.29
It is the year 227 Post Unification, and the Earth governed sector of the galaxy is awash with tales of a mysterious crime spree. Possessions of the rich keep disappearing. There are no signs of... More > entry. No DNA trace. No audit entry in the security system's log. Just a lot of empty safes. Some think it is a government conspiracy. Some think it is aliens. In fact, it is a woman called Lana, who likes to wear sensible shoes. But now a wealthy businessman has tracked her down, and he has a lucrative job offer for her. Just a short, interstellar trip aboard his bulk capable yacht, to steal a mysterious package, and she will be rich beyond her dreams. The problem is, Lana's activities have also drawn the attention of others, and now they are on the hunt, seeking revenge, seeking justice, seeking blood. Warning: Contains strong language< Less
Bulk Capable: Part 1 of the Watchers Trilogy By W.E.B. Fox
Paperback: $10.31
Prints in 3-5 business days
It is the year 227 Post Unification, and the Earth governed sector of the galaxy is awash with tales of a mysterious crime spree. Possessions of the rich keep disappearing. There are no signs of... More > entry. No DNA trace. No audit entry in the security system's log. Just a lot of empty safes. Some think it is a government conspiracy. Some think it is aliens. In fact, it is a woman called Lana, who likes to wear sensible shoes. But now a wealthy businessman has tracked her down, and he has a lucrative job offer for her. Just a short, interstellar trip aboard his bulk capable yacht, to steal a mysterious package, and she will be rich beyond her dreams. The problem is, Lana's activities have also drawn the attention of others, and now they are on the hunt, seeking revenge, seeking justice, seeking blood. Warning: Contains Strong Language.< Less
Best Practices for Incorporating Building Science Guidance into Community Risk MAP Implementation By Federal Emergency Management Agency & Department of Homeland Security
Paperback: $16.95
Prints in 3-5 business days
The datasets developed during a project are provided to the community, and the information allows the community to determine whether the higher risk areas require more stringent building codes. Both... More > regulatory and non-regulatory products are presented to the community in a series of Risk MAP meetings. The meetings also include information about Building Science Branch resources, such as the Building Science Toolkit CD, NFIP technical bulletins, disaster recovery advisories, building code assistance, web links, desk references, training resources, and technical publications, all of which can help the community meet FEMA’s goal of fostering resilience through hazard-resistant structure design that leads to reducing the loss of life and property in hazard events.< Less
Inside Interscan Web Suite 6.5 Pdf By Dale Johnson
eBook (PDF): $7.99
An administrator’s guide to Trend Micro's InterScan Web Security Suite which includes InterScan Web Virtual Appliance 6.5 (IWSVA), InterScan Web Security as a Service (IWSaaS) and InterScan Web... More > Security Host (IWSH). This in depth look at the installation, setup, and the maintaining of all three products allowing you to use them to their full potential.< Less
Microsoft Updates | Critical Windows, Edge Browser, Office Security Releases By krify tech
eBook (PDF): $8.99
Microsoft has started this month’s Patch weekday update cycle to mend vulnerabilities in its software package, and now, the highlights are Windows, Edge browser, web explorer, and the workplace... More > productivity suite.< Less
Extortionware 2011: The Official Fake Security Risks Removal Guide By C.V. Conner, Ph.D.
Paperback: $15.50
Prints in 3-5 business days
Most browser hijackers turn your usual web surfing into a real nightmare. Popular and often visited sites are blocked, web browser’s security is on the minimum level, Internet searches do not... More > go through powerful search engines, and much required information cannot be accessed. All these problems are common consequences of a browser hijack. A typical parasite will severely complicate your work and decreases your productivity. But now anyone can find and remove these nasty bugs without buying expensive software or hiring technicians.< Less
Extortionware 2011: The Official Fake Security Risks Removal Guide By C.V. Conner, Ph.D.
eBook (PDF): $3.99
Most browser hijackers turn your usual web surfing into a real nightmare. Popular and often visited sites are blocked, web browser’s security is on the minimum level, Internet searches do not... More > go through powerful search engines, and much required information cannot be accessed. All these problems are common consequences of a browser hijack. A typical parasite will severely complicate your work and decreases your productivity. But now anyone can find and remove these nasty bugs without buying expensive software or hiring technicians.< Less
Ccnp Security Sitcs Exam: 300-210 Complete Study Guide By IP Specialist
eBook (PDF): $27.99
This exam tests the knowledge of a Networking Engineer on advanced firewall architecture and its configuration with a next-generation firewall. This test also examines how the Network Engineer... More > utilizes the network access and uses the identity policies. Various new Cisco technologies such as Cisco NGFW, Cisco AMP, Cisco Firepower NGIPS, and Web & Email Security Solutions have been added to the test. Older technologies such as Cisco Intrusion Prevention System and the Firewall CX are no more covered in this exam.< Less
Developing Web Services with Apache CXF and Axis2 (3rd edition) By Kent Ka Iok Tong
Paperback: $39.95
Prints in 3-5 business days
If you'd like to learn how to create web services (in particular, using Apache CXF or Axis2) and make some sense of various standards like JAX-WS, JAX-RS, JAXB, SOAP, WSDL, REST, MTOM, WS-Security,... More > WS-Policy, XML Encryption and XML Signature, then this book is for you. Why? 1) It has a tutorial style that walks you through in a step-by-step manner. 2) It is concise. There is no lengthy, abstract description. 3) Many diagrams are used to show the flow of processing and high level concepts so that you get a whole picture of what's happening. 4) It contains working code. 5) The first two chapters are freely available on http://www.agileskills2.org. You can judge it yourself.< Less

Top 10

see more >
 
1
B Inspired B Inspired By Brandon Warren
Paperback: $15.99
 
 
 
 
4
19-20: MS V3.0 19-20: MS V3.0 By Liza Cowan
Paperback: $30.00