Advanced Search
Mike Swier  •  My Account  •  Sign Out
 

Overview

Other Readers Also Read...
Essential PHP Security

Essential PHP Security
by Chris Shiflett

Top Sellers in this Category

Security Strategies in Web Applications and Social Networking provides a unique, in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by an industry expert, this book provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the Internet. Using examples and exercises, this book incorporates hands-on activities to prepare readers to successfully secure Web-enabled applications.

This textbook is accompanied by a comprehensive supplements package, including all of the following: Instructor Resource Guide organized by learning objectives, with lesson plans, test questions, and Powerpoint presentation slides; lab simulations and lab manuals (labs available at additional cost), and online courseware compatible with your LMS.

About the Series

This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking—putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.

Subscriber Reviews

Average Rating: 0 out of 5 rating Based on 0 Ratings

No Subscribers have provided a review for this book. Be the first to create a review.

Some information on this page was provided using data from Amazon.com®. View at Amazon >

Table of Contents

 

Bookmarks

From this page, you can view, sort, and delete the Bookmarks you have created.

You do not currently have any bookmarks.

Search This Book

No search results.

Print Notes

Notes & Tags

On this page, you can view, filter, sort, edit, delete, and print all of the Notes for this title and Tags you have created.

You do not currently have any notes.

Get Safari Books Online at work and save money.

About Safari Books Online • Subscription Agreement • Gift Subscriptions • Privacy Policy • Contact Us • Corporate Licenses • Help • Accessibility | See us on FacebookSee us on Linked InSee us on TwitterRSS

Copyright 2011 Safari Books Online. All rights reserved.