Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them.
A definitive, expert-driven update of the popular, slash-dotted first edition, containing detailed Mac OS X security information and walkthroughs on securing systems, including the Snow Leopard operating system.
Internet security expert Matt Curtin's book, Developing Trust: Online Privacy and Security is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
Written with everyday users in mind, this practical book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities.
Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle.
The aim of Android Best Practices by Godfrey Nolan is to help those who have already created some Android apps to move to the next level to learn and apply best practices to their Android apps to make them less buggy, better performing and easier to use. This leads to better reviews and increased visibility, which should mean more sales of your apps.
Android Apps Security provides guiding principlesÂ for how to best design and develop Android apps with security in mind.Â The book explores techniques that developers can use to build additional layers of security into their apps beyond the security controls provided by Android itself.
Although a book about computer security, this goes far beyond the usual "beware the dangers of chat rooms" warnings to teach you everything you need to know to protect your computer, your privacy, and yourself.