𝔖 Scriptorium
✦   LIBER   ✦

📁

Secure Programs HOWTO

✍ Scribed by it-ebooks


Publisher
iBooker it-ebooks
Year
2017
Tongue
English
Leaves
194
Series
it-ebooks-2017
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.


📜 SIMILAR VOLUMES


Linux Security HOWTO
✍ Fenzi Kevin, Wreski Dave. 📂 Library 🌐 English

Этот документ является общим обзором проблем безопасности, которые встают перед администратором Linux систем. Он изображает общую философию безопасности и некоторые специфические примеры лучшей защиты вашей Linux системы от злоумышленников. Также включены касающиеся безопасности материалы и программ

Programmer's Ultimate Security DeskRef:
✍ James C Foster 📂 Library 📅 2004 🏛 Syngress 🌐 English

Based on snippets posted online, the authors and publishers of this book should be deeply ashamed of themselves. The "Risks" sections of various Common Lisp functions are complete gibberish--for instance warning about wildcard characters in filenames when discussing the IMPORT function which has not

HOWTO Secure and Audit Oracle 10g and 11
✍ Ron Ben-Natan 📂 Library 📅 2009 🏛 Auerbach Publications 🌐 English

<P>Oracle is the number one database engine in use today. The fact that it is the choice of military organizations and agencies around the world is part of the company’s legacy and is evident in the product. Oracle has more security-related functions, products, and tools than almost any other data

HOWTO Secure and Audit Oracle 10g and 11
✍ Ron Ben-Natan 📂 Library 📅 2009 🏛 Auerbach Publications (CRC Press) 🌐 English

Oracle is the number one database engine in use today. The fact that it is the choice of military organizations and agencies around the world is part of the company’s legacy and is evident in the product. Oracle has more security-related functions, products, and tools than almost any other database