Related Books

Malicious Mobile Code
Language: en
Pages: 548
Authors: Roger A. Grimes
Categories: Computers
Type: BOOK - Published: 2001-08-14 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

Malicious mobile code is a new term to describe all sorts of destructive programs: viruses, worms, Trojans, and rogue Internet content. Until fairly recently, e
Clean Code
Language: en
Pages: 464
Authors: Robert C. Martin
Categories: Computers
Type: BOOK - Published: 2009 - Publisher: Pearson Education

DOWNLOAD EBOOK

This title shows the process of cleaning code. Rather than just illustrating the end result, or just the starting and ending state, the author shows how several
Writing Secure Code
Language: en
Pages: 800
Authors: Michael Howard
Categories: Computers
Type: BOOK - Published: 2003 - Publisher: Pearson Education

DOWNLOAD EBOOK

Howard and LeBlanc (both are security experts with Microsoft) discuss the need for security and outline its general principles before outlining secure coding te
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Language: en
Pages: 396
Authors: R.R. Brooks
Categories: Computers
Type: BOOK - Published: 2004-11-29 - Publisher: CRC Press

DOWNLOAD EBOOK

The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature
Beautiful Code
Language: en
Pages: 621
Authors: Greg Wilson
Categories: Computers
Type: BOOK - Published: 2007-06-26 - Publisher: "O'Reilly Media, Inc."

DOWNLOAD EBOOK

How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that rev