Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them.
A definitive, expert-driven update of the popular, slash-dotted first edition, containing detailed Mac OS X security information and walkthroughs on securing systems, including the Snow Leopard operating system.
Written by an experienced consultant with 25 years of industry experience, Disaster Recovery, Crisis Response, and Business Continuity: A Management Desk Reference is a practical how-to guide that explains how to thrive in the face of natural disasters, man-made events, power outages, hackers, and anything else that might interrupt business operations.
Internet security expert Matt Curtin's book, Developing Trust: Online Privacy and Security is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
Written with everyday users in mind, this practical book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities.
This book provides a comprehensive look at the various facets of cloud security infrastructure, network, services, Compliance and users. It will provide real world case studies to articulate the real and perceived risks and challenges in deploying and managing services in a cloud infrastructure from a security perspective.
Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle.
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. The book explores techniques that developers can use to build additional layers of security into their apps beyond the security controls provided by Android itself.
Although a book about computer security, this goes far beyond the usual "beware the dangers of chat rooms" warnings to teach you everything you need to know to protect your computer, your privacy, and yourself.