1
by Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents: ... Authentication and SSL cURL; Chapter 21: Secure AJAX Shopping Cart; Chapter 22: Common Facebook Canvas...

2
by Matthews, Jeanna
Published 2005
Wiley
Table of Contents: ... protocol -- Exercise 2.1. Under the hood of HTTP -- Exercise 2.2. HTTP caching, authorization and cookies...

3
by Calder, Alan
Published 2020
IT Governance Ltd
Table of Contents: ... analysis -- Chapter 22: Step 5 -- Establish a continual improvement model...

4
by Chapple, Mike, Stewart, James Michael, Gibson, Darril
Published 2021
John Wiley and Sons, Inc.
Table of Contents: ... -- Organizational Roles and Responsibilities 21 -- Security Control Frameworks 22 -- Due Diligence and Due Care 23...

5
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ... -- 10.1.1 Security Challenge in Networks -- 10.1.2 Attacks Vulnerability in Complex Networks -- 10.2...

6
by Yarali, Abdulrahman
Published 2020
John Wiley & Sons
Table of Contents: ... Involvement 17 -- 2.2 Evolution to Broadband Systems 18 -- 2.2.1 Determining Factors 19 -- 2.2.2 Evolution...

7
Published 2018
John Wiley & Sons, Inc.
Table of Contents: ..., Pedro Comesaa, and Fernando Prez-Gonzlez -- 2.1 Introduction 25 -- 2.2 Framework 29 -- 2.2.1 IPTV...

8
Published 2022
Packt Publishing
.... In the fourth domain, we have network security at 19%. You will learn about threats, vulnerabilities, exploits...