Software Project Secrets: Why Software Projects Fail airs dirty laundry about the software industryhow putting project management's priorities above all else is the root cause of problems in software development projects. This book offers solutions to integrate project management with agile methodologies that really work for software development.
Pro PHP Security will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. You'll learn about various security measures that will help you prevent attackers from potentially disrupting site operation or destroying data.
"Hardening" is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies many of the risks of running Linux hosts and applications and provides practical examples and methods to minimize those risks.
Any company using .NET will eventually (if it hasn't already) expose part of its functionality as a .NET Web service, and securing these features will become job number one. This book provides a comprehensive treatment on how to secure Web services on the .NET platform.
Homes are becoming increasingly wired and, thanks to Wi-Fi, unwired. Hackers can strike quickly and create disastrous results! These stories and follow-ups are a fascinating insight into the modern threats we all face in the techno jungle.
Although a book about computer security, this goes far beyond the usual "beware the dangers of chat rooms" warnings to teach you everything you need to know to protect your computer, your privacy, and yourself.
Securing SQL Server is one of the most important responsibilities of the SQL Server professional, and this carefully researched book offers solid advice on implementing good practices that will ward off future viruses before they are even created.
Written with everyday users in mind, this practical book offers comprehensive tutorials for protecting privacy, preventing system attacks and, most important, avoiding difficulties from buggy programs and software laced with hidden functions and networking capabilities.
This guide is designed to provide a quick and easy checklist-style reference to the steps system administrators need to take to anticipate attacks and compromises, and to "harden" Windows NT, 2000, XP, and Server 2003 against them.