141
by Laurence, Tiana
Published 2017
Wiley
... their business and enhance their data security. Blockchain For Dummies covers the essential things you need...

142
by Jyoti, Dipanker, Hutcherson, James A.
Published 2021
Apress
Table of Contents: ... Application Architecture -- Chapter 4: Salesforce Data Architecture -- Chapter 5: Salesforce Security...

143
by Steger, Jim
Published 2008
Microsoft Press
Table of Contents: ... -- 3. Managing Security and Information Access -- pt. II. Customization -- 4. Entity Customization...

144
by Mueller, John
Published 2016
Wiley
Table of Contents: ... -- Choosing the Services You Need -- Considering AWS Security Issues -- Understanding the Amazon view...

145
by Boyce, Jim
Published 2007
Microsoft Press
Table of Contents: ... -- Automatically responding to messages -- Securing your system, messages, and identity -- Receiving messages...

146
by Galloway, Paul
Published 2009
Wiley
Table of Contents: ... security -- Direct mail -- Discussion boards/forums -- DNS services -- Domain names -- Duplication -- eBay...

147
by Dannen, Chris
Published 2017
Apress
Table of Contents: ...; The Path to Better Money; Cryptoeconomics and Security; Back to the Good Old Days; Cryptochaos; The Power...

148
by Dees, Melissa Hill
Published 2022
Packt Publishing, Limited
Table of Contents: ... Configuring Fundraising Features Configuring Additional Features and Security Declarative Tools and Modules...

149
by Murray, Brian H.
Published 2003
Amacom
Table of Contents: ... of Compromised Privacy and Security; Chapter 8 Using Online Competitive Intelligence to Outmaneuver Competitor...

150
by Putte, Geert van de
Published 2005
IBM Corp., International Technical Support Organization
... and custom XML documents, as well as how to secure such exchanges via digital signatures and encryption. Part...

151
by Fortnow, Matt, Terry, Quharrison
Published 2022
John Wiley & Sons, Inc.
... be shown step by step how to create, secure and fund your own cryptocurrency wallet, where you'll store...

152
by Williams, Bret, Bownds, Jonathan
Published 2016
Packt Publishing
... of Magento 2 Create sound development practices to insure code integrity and security Know the why, as well...

153
by Wittig, Michael, Wittig, Andreas
Published 2015
Manning Publications
... practices regarding security, high availability and scalability. You'll start with a broad overview of cloud...

154
Published 2003
Springer US
Table of Contents: ... of Web Contents -- Session II: Security Issues -- 4. Secure E-Commerce Transactions, Modeling...

155
Published 2024
Manning Publications
... and integrating a secure login mechanism, is taught through hands-on exercises, ensuring theoretical knowledge...

156
by Perkins, Colin
Published 2003
Addison-Wesley
Table of Contents: .... Header compression -- Ch. 12. Multiplexing and tunneling -- Ch. 13. Security considerations -- References...

157
by Shaalan, Sharif, Royer, Timothy
Published 2022
Packt Publishing Ltd.
Table of Contents: ... Management and Data Security Managing Projects with Sandboxes and Change Sets Using Data Modeling...

158
by Steger, Jim
Published 2009
Microsoft Press
Table of Contents: ... and Environment -- 3. Communicating with Microsoft CRM APls -- pt. II. Extending Microsoft CRM -- 4. Security -- 5...

159
by McGaw, Jim
Published 2009
Apress
Table of Contents: ... Intelligent Cross-Selling -- Chapter 10 AJAX -- Chapter 11 Getting In with Google -- Chapter 12 Web Security...