Security Books
-
Expert Service-Oriented Architecture in C#: Using the Web Services Enhancements 2.0
Published 16 years ago
by Jeffrey Hasan, Apress
I would strongly recommend this book, and it gets my personal highest honor, which means it is carried in my laptop case, so I always have it. This is the *single* best WSE 2 book and it is excellent, end to end. — Sam Gentile, Noted INETA Speaker, Microsoft MVP - .NET/C#, .
-
Hardening Apache
Published 16 years ago includes sample chapter
by Tony Mobily, Apress
This is a book which should definitely be included in any serious Apache administrator's bookshelf. The book walks intuitively through the setup process, from download and verification, to configuration and modifications, to running in production mode. — Blane Warrene, Expert Columnist, SitePoint. This book can save you pain, humiliation, and hair loss.
-
Covert Java: Techniques for Decompiling, Patching, and Reverse Engineering
Published 16 years ago
by Alex Kalinovsky, Sams
Developers face problems created by others every day - when asked to maintain someone else's code, or when forced to use a third-party library without documentation. They might come across exactly the feature they need to implement but can't get hold of the source code. They might spend frustrating hours trying different solutions that don't work.
-
Java Cryptography Extensions: Practical Guide for Programmers (The Practical Guides)
Published 16 years ago
by Jason Weiss, Morgan Kaufmann
Today's digital environment demands that every application design consider security early on in the design process. To achieve this, developers must be fluent in basic cryptographic nomenclature and comprehend the strengths and weaknesses of each algorithm or architecture before making a final design decision.
-
Enterprise Java(TM) Security: Building Secure J2EE(TM) Applications
Published 17 years ago
by Marco Pistoia, Nataraj Nagaratnam, Larry Koved, Anthony Nadalin, Addison-Wesley Professional
"For a long time, there has been a need for a J2EE security book. I am very happy to see there is now a book that can answer many of the technical questions that developers, managers, and researchers have about such a critical topic. I am sure that this book will contribute greatly to the success of the J2EE platform and e-business." --From the Foreword by Steven A.
-
Real World Microsoft Access Database Protection and Security
Published 17 years ago includes sample chapter
by Garry Robinson, Apress
Author Garry Robinson approaches this book differently than other Access books on the market: he keeps the focus on issues that will help protect your database. Written from an experienced developer's point of view, he discusses protection and security task-by-task. You'll learn to hide tables as system tables, produce databases difficult to crack, and back up databases.
-
J2EE Design Patterns
Published 17 years ago
by William Crawford, Jonathan Kaplan, O'Reilly Media
Architects of buildings and architects of software have more in common than most people think. Both professions require attention to detail, and both practitioners will see their work collapse around them if they make too many mistakes. It's impossible to imagine a world in which buildings get built without blueprints, but it's still common for software applications to be designed and built without blueprints, or in this case, design patterns.
-
C# Complete
Published 18 years ago
by Sybex, Sybex
C# Complete is a one-of-a-kind book--valuable both for its broad content and its low price. Whether you're brand-new to C# programming, are migrating from Visual Basic or Visual C++ to C#, or have already developed some expertise in C#, you'll get the skills you need to become proficient with Microsoft's powerful new language designed for the .NET platform. Creating complex applications in the .NET Framework is made easier with C#--Microsoft's first true object-oriented programming language.
-
Expert One-on-One J2EE Design and Development (Programmer to Programmer)
Published 18 years ago
by Rod Johnson, Wrox
The results of using J2EE in practice are often disappointing - applications are often slow, unduly complex, and take too long to develop. I believe that the problem lies not in J2EE itself, but in that it is often used badly. Many J2EE publications advocate approaches that, while fine in theory, often fail in reality, or deliver no real business value. In this book I offer a real-world, how-to guide so that you can make J2EE work in practice.
-
J2EE & Java: Developing Secure Web Applications with Java Technology (Hacking Exposed)
Published 18 years ago
by Art Taylor, Brian Buege, Randy Layman, McGraw-Hill
Written in the same exciting and informative style as the international blockbuster Hacking Exposed, this book provides comprehensive coverage of the tools and techniques for testing and correcting J2EE and Java security issues. Includes examples of J2EE attacks and countermeasures, risk ratings throughout the chapters and case studies.