intTypePromotion=4
ADSENSE

Developing secure applications

Xem 1-20 trên 338 kết quả Developing secure applications
  • Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own applications using the Microsoft CryptoAPI, and the new security features of Windows 2000. Developers who have been confused by the high-end, academic style of other encryption books and cryptography theory will delight with Chapman's understandable style and hands-on methods.

    pdf606p trac2_123 11-04-2013 52 15   Download

  • THE Java™ Web Services Tutorial is a guide to developing Web applications with the Java Web Services Developer Pack (Java WSDP). The Java WSDP is an all-in-one download containing key technologies to simplify building of Web services using the Java 2 Platform. This tutorial requires a full installation (Typical, not Custom) of the Java WSDP, v1.6 with the Sun Java System Application Server Platform Edition 8.1 2005Q2 UR2 (hereafter called the Application Server). Here we cover all the things you need to know to make the best use of this tutorial....

    pdf463p ptng13 16-05-2012 96 26   Download

  • Part I presents fundamental concepts of data security requirements and threats that pertain to connecting to a database, accessing and altering tables, and using applications. In addition, security checklists are provided for DBAs and application developers, which cover installation preparation, database administration best practices, and recommendations for developing secure applications.

    pdf424p thuxuan 03-08-2009 72 5   Download

  • will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos – a private-key authentication service then X.509 - a public-key directory authentication service

    ppt26p muathu_102 28-01-2013 36 4   Download

  • transport layer security service originally developed by Netscape version 3 designed with public input subsequently became Internet standard known as TLS (Transport Layer Security) uses TCP to provide a reliable end-to-end service SSL has two layers of protocols

    ppt23p muathu_102 28-01-2013 34 2   Download

  • p 01-01-1970   Download

  • Oracle Database 11g contains several major innovations in the areas of change management, fault diagnosability, performance management, Data Guard administration, storage management, and data warehousing, among other areas. Besides the database administration changes, there are significant improvements in application development–related features, including natively compiled PL/SQL code, PL/SQL inlining, and enhanced triggers.

    pdf632p nghianguyenluong 30-06-2009 288 133   Download

  • Andrew Connell has a background in content management solutions and Web development that spans back to his time as a student at the University of Florida in the late 1990s managing class sites. He has consistently focused on the challenges facing businesses to maintain a current and dynamic online presence without having to rely constantly on Web developers or have a proficiency in Web technologies.

    pdf459p huyhoang 05-08-2009 255 106   Download

  • The .NET platform is the foundation upon which the next generation of software will be built. Microsoft has invested a lot of capital in its development, and is putting its considerable weight behind its adoption as a new standard. A long list of Microsoft partners have also announced support for .NET tools and components— you can check http://msdn.microsoft.com/vstudio/partners for a current list of vendors who have .NET offerings. The .NET platform is much more than a new language, software development kit (SDK), or even an operating system.

    pdf817p maiphuong 10-08-2009 357 104   Download

  • Sun Microsystems, Inc. has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more U.S. patents or pending patent applications in the U.S. and in other countries. U.S. Government Rights – Commercial software. Government users are subject to the Sun Microsystems, Inc. standard license agreement and applicable provisions of the FAR and its supplements. This distribution may include materials developed by third parties.

    pdf1124p nuoiheocuoivo 09-05-2010 175 49   Download

  • This book is a step-by-step tutorial to developing a real-world application using the Yii web application development framework. The book attempts to mirror the environment of a software development team that is being tasked with building an online application, touching on each aspect of the software development lifecycle, as you build a project task management application from its conception to its production deployment.

    pdf332p hotmoingay3 09-01-2013 161 49   Download

  • Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features.

    pdf481p m3onh0x84 10-04-2011 162 48   Download

  • PHP & MySQL Web Development All-in-One Desk Reference For Dummies is kind of one-stop shopping for the information you need to get up and running with these tools and put them to good use. It’s divided into six handy minibooks that cover setting up your environment, PHP programming, using MySQL, security, PHP extensions, and PHP Web applications. They make it easy to create a Web site where visitors can sign on, use shopping carts, complete forms, and do business with your business.

    pdf675p trasua_123 14-01-2013 111 42   Download

  • This edited book has been published to showcase the emergence of relevant insights, applications, and the global acceptance of electronic business (e-business). At this stage of the development of e-business, it is crucially important to monitor, report, and reflect on the progress of e-business’ applications and adoption around the world.

    pdf146p lulanphuong 17-03-2012 112 31   Download

  • For the past years, the advancement and innovation of various fields of technology converge that resulted in the formation of emerging technologies. A technical innovation which represents progressive developments within a field of competitive advantage is considered as an emerging technology. In general, emerging technologies denote significant technology developments that capture new territory for the betterment of humanity. To date, creating new technologies and innovative algorithms is the focus of research and development.

    pdf348p orchid_1 25-09-2012 72 30   Download

  • There are many different technologies available today for developing complex web sites and web applications, and with so many to choose from, it’s great that there’s one technology in particular that stands out from the crowd and is such a joy to use. ASP.NET 2.0 is a fantastic technology that enables you to develop web sites and applications with very little hassle. Developing web applications was never this easy, yet even though it may appear simple, there is real power and depth to this technology that enables it to host even the most complex applications available today....

    pdf769p tailieuvip13 19-07-2012 329 24   Download

  • You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and security breaches. You'll start with a thorough look at ASP.NET 3.5 basics and see happens when you don't implement security, including some amazing examples. The book then delves into the development of a Web application, walking you through the vulnerable points at every phase.

    pdf440p titatu_123 01-03-2013 72 18   Download

  • This book is aimed at equipping you, the developer, to understand the technologies that are available to allow you to rapidly build secure, quality web experiences. Note that I use the term experiences and not applications or sites. That is because the user experience is the heart of the future Web.

    pdf397p tailieuvip13 20-07-2012 60 17   Download

  • Portal development projects have become the centerpiece of IT acquisition and development strategy for many organizations. Enterprise integration and Web application developers predictably groan when they hear the word “portal”—nightmares of proprietary APIs, oversold features, and shoddy tool integrations. The authors of this book have been involved in over a dozen production portal efforts over the last several years. In that time, we have dealt with numerous products and frameworks, including some in-house frameworks based on servlets and JSPs.

    pdf459p tailieuvip13 19-07-2012 74 16   Download

  • If you want to learn how to build killer user interfaces for Windows and the web, then this book is for you. It arms you with the tools and code you'll need to effectively utilize the Windows Presentation Foundation (WPF). From creating appealing graphics and animated structures to enhancing performance and security, you'll be programming in no time. First you'll explore the WPF framework and learn how to develop basic applications with ASP.NET or Visual Basic(r).

    pdf482p lock_123 08-04-2013 86 16   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

p_strKeyword=Developing secure applications
p_strCode=developingsecureapplications

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2