Suitable for the practicing or aspiring design consultant, this title brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, & write a report. It focuses on consulting in security design, not security management. ...
Covers the basics of securing your system environment as well as security concepts & how these concepts can be implemented practically using common tools & applications. This title helps to learn how to apply & implement general security concepts & identify & solve situations within your network & organization. ...
Ubiquitous computing is about distributed systems with a difference. It is about computers embedded in devices (such as phones, washing machines, TVs, heating systems, smartcards, & others) communicating with each other over ad-hoc wireless networks. ...
Web services based on the e Xtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), & related standards, & deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within & across organizations. This title provides a guide to security for Web services & SOA. ...
Presents the distillation of best practices & lessons learned from the contemporary operating environment in Iraq & Afghanistan with regard to security force assistance, & offers recommendations that build upon initiatives within the Department of Defense to create a comprehensive approach to improve US security force assistance (SFA). ...
This book examines the security agendas of the European Union, the UK, France, Germany & Russia in connection with three defining events in international security - the crisis in Kosovo of 1999, the terrorist attacks of 9/11 & the Iraq crisis of 2003 - in order to assess the potential for alliance-building among European actors. ...
Helps you discover how technology is affecting your business, & why typical security mechanisms are failing to address the issue of risk & trust. This title looks at the perplexing issues of cyber security. It provides an understanding of IT security in the converged world of communications technology based on the Internet Protocol. ...
Covers the economics of cyber security & the intersection of privacy & information security. This title introduces the core concepts & vocabulary of computer security, including attacks & controls. It identifies & assesses the threats facing programs, operating systems, database systems, & networks. ...
Archived Product
Security For Visual Basic Programmers
This resource is an end-to-end guide, with clear prescriptive guidance for best practices, application design, and coding techniques for Windows and Web-based applications. It makes writing secure applications easier than ever before. (Computer Books)
RIP - This product is no longer available on our network. It was last seen on 01.01.2015
This page now acts as a permanent archive for this product. Add more information using the comments box below to ensure it can still be found by future generations.
Use our search facility to see if it is available from an alternative contributor.
This resource is an end-to-end guide, with clear prescriptive guidance for best practices, application design, & coding techniques for Windows & Web-based applications. It makes writing secure applications easier than ever before. (Computer Books)
Reviews/Comments
Add New
Intelligent Comparison
Oooops! We couldn't find anything! Perhaps this product's unique.... Or perhaps we are still looking for comparisons! Click to bump this page and we'll hurry up.
Price History
Oooops! We couldn't find any historical pricing!
Vouchers
No voucher codes found. Do you know a voucher code for this product or supplier? Add it to Insights for others to use.
Facebook
Jargon Buster
Computer - A programmable electronic machine which stores and manipulates data.
Design - A drawing or styles that shows the look and functionality of something before its made.