Web commerce security design and development /
Provides information on designing effective security mechanisms for e-commerce sites, covering such topics as cryptography, authentication, information classification, threats and attacks, and certification.
I tiakina i:
| Kaituhi matua: | Nahari, Hadi |
|---|---|
| Kaituhi rangatōpū: | ebrary, Inc |
| Ētahi atu kaituhi: | Krutz, Ronald L. |
| Hōputu: | Tāhiko īPukapuka |
| Reo: | Ingarihi |
| I whakaputaina: |
Indianapolis :
Wiley Pub.,
c2011.
|
| Ngā marau: | |
| Urunga tuihono: | An electronic book accessible through the World Wide Web; click to view |
| Ngā Tūtohu: |
Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
|
- Ngā puringa
- Whakaahuatanga
- Rārangi ihirangi
- Ngā Tākupu
- Ētahi Atu Putanga (1)
- Ngā tūemi rite
- Tirohanga kaimahi
Ngā tūemi rite
Web commerce security design and development /
mā: Nahari, Hadi
I whakaputaina: (2011)
mā: Nahari, Hadi
I whakaputaina: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
mā: Mularien, Peter
I whakaputaina: (2010)
mā: Mularien, Peter
I whakaputaina: (2010)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
mā: Mularien, Peter
I whakaputaina: (2010)
mā: Mularien, Peter
I whakaputaina: (2010)
Designing network security : a practical guide to creating a secure network infrastructure /
mā: Kaeo, Merike
I whakaputaina: (2004)
mā: Kaeo, Merike
I whakaputaina: (2004)
Designing network security : a practical guide to creating a secure network infrastructure /
mā: Kaeo, Merike
I whakaputaina: (2004)
mā: Kaeo, Merike
I whakaputaina: (2004)
IoT security issues /
mā: Gilchrist, Alasdair
I whakaputaina: (2017)
mā: Gilchrist, Alasdair
I whakaputaina: (2017)
IoT security issues /
mā: Gilchrist, Alasdair
I whakaputaina: (2017)
mā: Gilchrist, Alasdair
I whakaputaina: (2017)
Internet security and firewalls
mā: Preetham, V. V.
I whakaputaina: (2002)
mā: Preetham, V. V.
I whakaputaina: (2002)
Internet security and firewalls
mā: Preetham, V. V.
I whakaputaina: (2002)
mā: Preetham, V. V.
I whakaputaina: (2002)
Advances in cyber security : technology, operations, and experiences /
I whakaputaina: (2013)
I whakaputaina: (2013)
Advances in cyber security : technology, operations, and experiences /
I whakaputaina: (2013)
I whakaputaina: (2013)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
I whakaputaina: (2001)
I whakaputaina: (2001)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
I whakaputaina: (2001)
I whakaputaina: (2001)
Network and security issues for internet mobile entertainment
I whakaputaina: (2004)
I whakaputaina: (2004)
Network and security issues for internet mobile entertainment
I whakaputaina: (2004)
I whakaputaina: (2004)
Internet security you can afford : using untangle as your internet gateway /
mā: Dawson, Christopher
I whakaputaina: (2015)
mā: Dawson, Christopher
I whakaputaina: (2015)
Internet security you can afford : using untangle as your internet gateway /
mā: Dawson, Christopher
I whakaputaina: (2015)
mā: Dawson, Christopher
I whakaputaina: (2015)
Part-themed issue on internet security
I whakaputaina: (2006)
I whakaputaina: (2006)
Part-themed issue on internet security
I whakaputaina: (2006)
I whakaputaina: (2006)
Mastering network security
mā: Brenton, Chris
I whakaputaina: (2003)
mā: Brenton, Chris
I whakaputaina: (2003)
Computer security fundamentals /
mā: Easttom, Chuck
I whakaputaina: (2006)
mā: Easttom, Chuck
I whakaputaina: (2006)
Computer security fundamentals /
mā: Easttom, Chuck
I whakaputaina: (2006)
mā: Easttom, Chuck
I whakaputaina: (2006)
Mastering network security
mā: Brenton, Chris
I whakaputaina: (2003)
mā: Brenton, Chris
I whakaputaina: (2003)
Developer's guide to web application security
mā: Cross, Michael
I whakaputaina: (2007)
mā: Cross, Michael
I whakaputaina: (2007)
Developer's guide to web application security
mā: Cross, Michael
I whakaputaina: (2007)
mā: Cross, Michael
I whakaputaina: (2007)
Designing and building enterprise DMZs
mā: Flynn, Hal
I whakaputaina: (2006)
mā: Flynn, Hal
I whakaputaina: (2006)
Designing and building enterprise DMZs
mā: Flynn, Hal
I whakaputaina: (2006)
mā: Flynn, Hal
I whakaputaina: (2006)
Hacking the code ASP. NET web application security /
mā: Burnett, Mark (Mark M.)
I whakaputaina: (2004)
mā: Burnett, Mark (Mark M.)
I whakaputaina: (2004)
Hacking the code ASP. NET web application security /
mā: Burnett, Mark (Mark M.)
I whakaputaina: (2004)
mā: Burnett, Mark (Mark M.)
I whakaputaina: (2004)
Threat modeling : designing for security /
mā: Shostack, Adam
I whakaputaina: (2014)
mā: Shostack, Adam
I whakaputaina: (2014)
Threat modeling : designing for security /
mā: Shostack, Adam
I whakaputaina: (2014)
mā: Shostack, Adam
I whakaputaina: (2014)
Web security basics
mā: Bhasin, Shweta, 1977-
I whakaputaina: (2003)
mā: Bhasin, Shweta, 1977-
I whakaputaina: (2003)
Web security basics
mā: Bhasin, Shweta, 1977-
I whakaputaina: (2003)
mā: Bhasin, Shweta, 1977-
I whakaputaina: (2003)
Wireless communications security : solutions for the internet of things /
mā: Penttinen, Jyrki T. J.
I whakaputaina: (2017)
mā: Penttinen, Jyrki T. J.
I whakaputaina: (2017)
Wireless communications security : solutions for the internet of things /
mā: Penttinen, Jyrki T. J.
I whakaputaina: (2017)
mā: Penttinen, Jyrki T. J.
I whakaputaina: (2017)
Managing information security
I whakaputaina: (2010)
I whakaputaina: (2010)
Managing information security
I whakaputaina: (2010)
I whakaputaina: (2010)
Securing the cloud cloud computer security techniques and tactics /
mā: Winkler, J. R. (Joachim R.)
I whakaputaina: (2011)
mā: Winkler, J. R. (Joachim R.)
I whakaputaina: (2011)
Securing the cloud cloud computer security techniques and tactics /
mā: Winkler, J. R. (Joachim R.)
I whakaputaina: (2011)
mā: Winkler, J. R. (Joachim R.)
I whakaputaina: (2011)
Innocent code a security wake-up call for Web programmers /
mā: Huseby, Sverre H.
I whakaputaina: (2004)
mā: Huseby, Sverre H.
I whakaputaina: (2004)
Ngā tūemi rite
-
Web commerce security design and development /
mā: Nahari, Hadi
I whakaputaina: (2011) -
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
mā: Mularien, Peter
I whakaputaina: (2010) -
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
mā: Mularien, Peter
I whakaputaina: (2010) -
Designing network security : a practical guide to creating a secure network infrastructure /
mā: Kaeo, Merike
I whakaputaina: (2004) -
Designing network security : a practical guide to creating a secure network infrastructure /
mā: Kaeo, Merike
I whakaputaina: (2004)