Security Book from Developer Fusion https://www.developerfusion.com/t/security/books/sort/popularity/ Security Book from Developer Fusion http://www.rssboard.org/rss-specification en-GB Fri, 03 Jul 2009 00:00:00 GMT Security Enhancement Schemes for Wireless Networks: Deploying Neural Nets and Digital Signatures The IEEE 802.11 standard is becoming the most popular and efficient network topology deployed today. Providing and ensuring the security of wireless network is essential part to its continuous growth. Goals such as confidentiality and trust imply that every data transmitted by each user stays known only to the communicating parties. Authorization of users is also a very important aspect of network integrity. http://www.developerfusion.com/book/46004/security-enhancement-schemes-for-wireless-networks-deploying-neural-nets-and-digital-signatures/ http://www.developerfusion.com/book/46004/security-enhancement-schemes-for-wireless-networks-deploying-neural-nets-and-digital-signatures/ Fri, 03 Jul 2009 00:00:00 GMT James Crowley Developing Trust: Online Privacy and Security Suitable for the IP manager or developer seeking to improve Web privacy and security, Developing Trust: Online Privacy and Security provides an intriguing, though at times somewhat theoretical, guide to the issues surrounding privacy today.Interestingly, this book straddles an expert-eye, theoretical overview of what privacy is and a more practical view of how it is often undermined on the Internet today. Early sections cover basic terms and concepts of privacy at a fairly high level. http://www.developerfusion.com/book/44035/developing-trust-online-privacy-and-security/ http://www.developerfusion.com/book/44035/developing-trust-online-privacy-and-security/ Tue, 04 Dec 2001 00:00:00 GMT James Crowley Beginning Information Cards and CardSpace: From Novice to Professional If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identitya platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find Beginning Information Cards and CardSpace: From Novice to Professional essential to understanding and successfully implementing CardSpace solutions. http://www.developerfusion.com/book/44328/beginning-information-cards-and-cardspace-from-novice-to-professional-experts-voice-in-net/ http://www.developerfusion.com/book/44328/beginning-information-cards-and-cardspace-from-novice-to-professional-experts-voice-in-net/ Thu, 09 Aug 2007 00:00:00 GMT James Crowley Professional Windows DNA: Building Distributed Web Applications with VB, COM+, MSMQ, SOAP, and ASP This book provides a practical and detailed roadmap of Windows DNA. Anchor book to the entire Wrox DNA series, it is divided into 6 sections: Introduction, Business Layer, Data Layer, Prese. http://www.developerfusion.com/book/311/professional-windows-dna/ http://www.developerfusion.com/book/311/professional-windows-dna/ Fri, 01 Sep 2000 00:00:00 GMT Wrox Press .NET Security When you use .NET to create client-and server-side applications, you have to address a new and large set of security issues. .NET Security shows you what you need to know by covering different aspects of the .NET security model through detailed discussions about the key namespaces. The authors demonstrate how to write .NET code to create secure systems within the .NET Framework. They also discuss possible break-ins to the security model in .NET&emdash;and how .NET prevents such intrusions. http://www.developerfusion.com/book/44087/net-security/ http://www.developerfusion.com/book/44087/net-security/ Tue, 09 Jul 2002 00:00:00 GMT James Crowley Professional C# The ideal introduction to writing C# programs on the .NET Framework, for developers working at the leading edge. http://www.developerfusion.com/book/1631/professional-c/ http://www.developerfusion.com/book/1631/professional-c/ Fri, 01 Jun 2001 00:00:00 GMT Wrox Press Honeypots for Windows ...a handy book to keep as a general security reference. — Lou Vega, member, Greater Charleston . ...this looks like it'd be cool as h3ll to really do. — Bill Ryan, Bill's House O Insomnia Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. http://www.developerfusion.com/book/44158/honeypots-for-windows-the-experts-voice/ http://www.developerfusion.com/book/44158/honeypots-for-windows-the-experts-voice/ Mon, 14 Feb 2005 00:00:00 GMT James Crowley SMS 2003 Recipes: A Problem-Solution Approach Systems Management Server (SMS) 2003 provides a comprehensive solution for managing the Microsoft platform, enabling organizations to proactively manage their environment. SMS 2003 provides key capabilities like Application Deployment Asset Management Security Patch Management Remote User Management Mobile Systems Management Integration of people, processes, and technology to help solve specific customer scenarios SMS 2003 Recipes: A Problem-Solution Approach provides you with hundreds of quic http://www.developerfusion.com/book/44163/sms-2003-recipes-a-problemsolution-approach/ http://www.developerfusion.com/book/44163/sms-2003-recipes-a-problemsolution-approach/ Wed, 06 Sep 2006 00:00:00 GMT James Crowley Foundations of Mac OS X Leopard Security Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish the “best practices” for Mac OS X for a wide audience. http://www.developerfusion.com/book/44391/foundations-of-mac-os-x-leopard-security-books-for-professionals-by-professionals/ http://www.developerfusion.com/book/44391/foundations-of-mac-os-x-leopard-security-books-for-professionals-by-professionals/ Thu, 24 Apr 2008 00:00:00 GMT James Crowley Pro PHP Security Pro PHP Security is one of the first books devoted solely to PHP security. It will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. (And the methods discussed are compatible with PHP versions 3, 4, and 5.) The knowledge you'll gain from this comprehensive guide will help you prevent attackers from potentially disrupting site operation or destroying data. http://www.developerfusion.com/book/44194/pro-php-security/ http://www.developerfusion.com/book/44194/pro-php-security/ Mon, 29 Aug 2005 00:00:00 GMT James Crowley