-
Visual Media Coding and Transmission
Author Ahmet Kondoz
This book presents the state-of-the-art in visual media coding and transmissionVisual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields ....
Release Date 2010/04 -
Internet and Web Application Security, 3rd Edition
Author Mike Harwood , Ron Price
Internet and Web Application Security, Third Edition provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by industry experts, this book provides a comprehensive explanati....
Release Date 2022/11 -
Getting a Coding Job For Dummies®
Author Nikhil Abraham
Your friendly guide to getting a job in codingGetting a Coding Job For Dummies explains how a coder works in (or out of) an organization, the key skills any job requires, the basics of the technologies a coding pro will encounter, and how to find formal or informal....
Release Date 2015/08 -
The Complete Coding Interview Guide in Java
Author Anghel Leonard
Explore a wide variety of popular interview questions and learn various techniques for breaking down tricky bits of code and algorithms into manageable chunksKey FeaturesDiscover over 200 coding interview problems and their solutions to help you secure a job as a Java dev....
Release Date 2020/08 -
Author Aalseth
In clear and straightforward language, Medical Coding: What It Is and How It Works, Second Edition provides an overview of the evolution of medical coding and all the various coding systems, how they relate, and how they function. Reasoning and consequences of the d....
Release Date 2014/08 -
Computer Security Fundamentals, 5th Edition
Author William Chuck Easttom
ONE-VOLUME INTRODUCTION TO COMPUTER SECURITYClearly explains core concepts, terminology, challenges, technologies, and skillsCovers today's latest attacks and countermeasuresThe perfect beginner's guide for anyone interested in a computer security careerDr. Chuck Easttom brings together complete c....
Release Date 2023/02 -
Interpretation and Application of IPSAS
Author Isabelle Andernack , Caroline Aggestam-Pontoppidan
Clear, practical IPSAS guidance, explanation, and examplesInterpretation and Application of IPSAS provides practical guidance on the implementation and application of the International Public Sector Accounting Standards. This book brings readers up to date on the s....
Release Date 2016/02 -
A Complete Guide to Burp Suite : Learn to Detect Application Vulnerabilities
Author Sagar Rahalkar
Use this comprehensive guide to learn the practical aspects of Burp Suite—from the basics to more advanced topics. The book goes beyond the standard OWASP Top 10 and also covers security testing of APIs and mobile apps.Burp Suite is a simple, yet powerful, tool used for a....
Release Date 2020/11 -
Author Nikhil Abraham
Hands-on exercises help you learn to code like a proNo coding experience is required for Coding For Dummies, your one-stop guide to building a foundation of knowledge in writing computer code for web, application, and software development. It doesn't matter if you....
Release Date 2015/02 -
Author Nikhil Abraham
Coding For Dummies, (9781119293323) was previously published as Coding For Dummies, (9781118951309). While this version features a new Dummies cover and design, the content is the same as the prior release and should not be considered a new or updated product.Hands....
Release Date 2016/06 -
Bug Bounty Hunting for Web Security: Find and Exploit Vulnerabilities in Web sites and Applications
Author Sanjib Sinha
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your....
Release Date 2019/11 -
Author Daniel Sawano , Dan Bergh Johnsson , Daniel Deogun
Secure by Design teaches you principles and best practices for writing highly secure software. At the code level, you’ll discover security-promoting constructs like safe error handling, secure validation, and domain primitives. You’ll also master security-centric t....
Release Date 2019/09 -
Author Robert G. Werner , James A. Bach
The H-1B visa is the gateway for the world's best and brightest to live and work in the United States as IT professionals, engineers, scientists, professors, doctors, nurses, and researchers. How to Secure Your H-1B Visa guides employees and employers alike through....
Release Date 2013/01 -
The Oliver Wight Class A Standard for Business Excellence, 7th Edition
Author Oliver Wight International , Inc.
The Oliver Wight Class A Standard for Business Excellence is the definitive, comprehensive statement of excellence in business today. Oliver Wight’s Class A Standard is the accumulated practice and experience of Oliver Wight Consultants around the world. It reflect....
Release Date 2017/05 -
Sourcing to Support the Green Initiative
Author Lisa Ellram , Wendy Tate
The “green” or environmental sustainability movement has taken hold throughout the world. Its staying power is confirmed by that fact that environmental emphasis in organizations did not decrease during the recent global recession, but rather increased. However, sin....
Release Date 2013/07 -
Author Camille McCue
An easy-to-grasp introduction to coding concepts for kidsCoding For Kids For Dummies breaks coding into a series of small projects, each designed to teach elementary-to-middle-school-aged students a core concept to build a game, application, or other tool. In this h....
Release Date 2014/11 -
Author Chris Minnick , Eva Holland
Learn to code the fun way with nine real projects for true beginnersAdventures in Coding is written specifically for young people who want to learn how to code, but don't know where to begin. No experience? No problem! This book starts from the very beginning to t....
Release Date 2016/03 -
Cloud Native Application Security
Cloud native applications do more than just run on a different platform. The entire scope of these applications is different, including the methodologies and skills used to build them. Security practices for these applications need a transformation of equal magnitude. With this report, you'll learn.... -
Next-Generation Video Coding and Streaming
Author Benny Bing
Reviews the new High Efficiency Video Coding (HEVC) standard and advancements in adaptive streaming technologies for use in broadband networks and the InternetThis book describes next-generation video coding and streaming technologies with a comparative assessment ....
Release Date 2015/10 -
Building Secure Software: How to Avoid Security Problems the Right Way
Author Gary McGraw , John Viega
Most organizations have a firewall, antivirus software, and intrusion detection systems, all of which are intended to keep attackers out. So why is computer security a bigger problem today than ever before? The answer is simple--bad software lies at the heart of all....
Release Date 2001/09 -
Secure Coding: Principles and Practices
Author Kenneth R. van Wyk , Mark G. Graff
Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and ....
Release Date 2003/06 -
Author Roman Zabicki
Most security professionals don't have the words "security" or "hacker" in their job title. Instead, as a developer or admin you often have to fit in security alongside your official responsibilities - building and maintaining computer systems. Implement the basic....
Release Date 2019/02 -
Cracking Security Misconceptions
Author Andrew Peterson
As stories continue to mount about security breaches in organizations and government agencies—such as the 2016 US Department of Justice hack—many people believe there’s really nothing they can do about it. Fact is, you can do quite a bit. In this report, security p....
Release Date 2016/09 -
Author Andrew Hoffman
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both defensive and offensive security concepts that software engineers can easily ....
Release Date 2020/06 -
The CERT® C Secure Coding Standard
Author Robert C. Seacord
“I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CER....
Release Date 2008/10 -
Author Sunny Wear
Get hands-on experience in using Burp Suite to execute attacks and perform web assessmentsKey FeaturesExplore the tools in Burp Suite to meet your web infrastructure security demands Configure Burp to fine-tune the suite of tools specific to the target Use Burp ext....
Release Date 2018/09 -
Author Laura Bell , Jim Bird , Rich Smith , Michael Brunton-Spall
Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren’t up to speed in their understandin....
Release Date 2017/09 -
Designing and Developing Secure Azure Solutions
Author Michael Howard , Simone Curzi , Heinrich Gantenbein
Plan, build, and maintain highly secure Azure applications and workloadsAs business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across t....
Release Date 2022/11 -
Author Peter Senge , Don Frick
Meet the man whose work influenced some of the world's most prominent business leaders and spawned a worldwide movement that is still gaining strength today. Robert Greenleaf's landmark 1970 essay, The Servant as Leader, introduced the now common term “servan....
Release Date 2004/06 -
Practical Linux Security Cookbook - Second Edition
Author Tajinder Kalsi
Enhance file system security and learn about network attack, security tools and different versions of Linux build.Key FeaturesHands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use v....
Release Date 2018/08