Books on the topic 'App Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'App Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
service), SpringerLink (Online, ed. Pro ASP.NET Web API Security: Securing ASP.NET Web API. Berkeley, CA: Apress, 2013.
Find full textBush), United States President (1989-1993 :. Decision to order the divestment of a company located in Seattle, WA: Communication from the President of the United States transmitting a report on his decision to order the divestment of a company located in Seattle, WA; copy of the order, pursuant to 50 U.S.C. app. 2170. Washington: U.S. G.P.O., 1990.
Find full textSiriwardena, Prabath. Advanced API Security. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-2050-4.
Full textSiriwardena, Prabath. Advanced API Security. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6817-8.
Full textVollmert, Robert. ADP security at NRL. Washington, DC: Naval Research Laboratory, 1986.
Find full textLongley, Dennis, and Michael Shain. Data & Computer Security. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-11170-1.
Full textEloff, Jan H. P., Les Labuschagne, Rossouw von Solms, and Jan Verschuren, eds. Information Security Management & Small Systems Security. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35575-7.
Full textTelecommunications, United States Veterans Administration Office of Data Management and. ODM&T ADP security handbook. Washington, DC: Veterans Administration, Office of Data Management and Telecommunications, 1986.
Find full textLakshmiraghavan, Badrinarayanan. Pro ASP.NET Web API Security. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5783-7.
Full textEloff, Jan H. P., Les Labuschagne, Rossouw Solms, and Gurpreet Dhillon, eds. Advances in Information Security Management & Small Systems Security. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/b116849.
Full textAl-Turjman, Fadi, ed. Smart Cities Performability, Cognition, & Security. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-14718-1.
Full textAutomated password generator (APG). Gaithersburg, MD: Dept. of Commerce, National Institute of Standards and Technology, 1994.
Find full textBhardwaj, Akashdeep, and Varun Sapra, eds. Security Incidents & Response Against Cyber Attacks. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69174-5.
Full textBen Ahmed, Mohamed, Boudhir Anouar Abdelhakim, Bernadetta Kwintiana Ane, and Didi Rosiyadi, eds. Emerging Trends in Intelligent Systems & Network Security. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-15191-0.
Full textGeorgiadis, Christos K., Hamid Jahankhani, Elias Pimenidis, Rabih Bashroush, and Ameer Al-Nemrat, eds. Global Security, Safety and Sustainability & e-Democracy. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33448-1.
Full textVisan, Andrei. Securing a Spring Boot REST API Using Spring Security with iPad Pro and Raspberry Pi 4. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8059-1.
Full textGómez-Sánchez, Francisco Falcón. Manual de seguridad social: IPSS-AFP. Lima: Editora Normas Legales, 1994.
Find full textWalters, Robert, and Marko Novak. Cyber Security, Artificial Intelligence, Data Protection & the Law. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1665-5.
Full textDagar, Jagdish Chander, Anil Kumar Singh, and Ayyanadar Arunachalam, eds. Agroforestry Systems in India: Livelihood Security & Ecosystem Services. New Delhi: Springer India, 2014. http://dx.doi.org/10.1007/978-81-322-1662-9.
Full textGary, Ellison, and Dageforde Mary, eds. Inside Java 2 platform security: Architecture, API design, and implementation. 2nd ed. Boston, MA: Addison-Wesley, 2004.
Find full textPeter, Martini, Meier Michael, Tölle Jens, and SpringerLink (Online service), eds. Future Security: 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textZainon, R., ed. 3rd International Conference on Radiation Safety & Security in Healthcare Services. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7859-0.
Full textMalizia, Andrea, and Marco D'Arienzo, eds. Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91791-7.
Full textRatuva, Steven, Radomir Compel, and Sergio Aguilar, eds. Guns & Roses: Comparative Civil-Military Relations in the Changing Security Environment. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-2008-8.
Full textZavodny, Joseph E. Security requirements and organization for non-tactical ADP systems on small surface ships. Monterey, Calif: Naval Postgraduate School, 1985.
Find full textAriztía, Juan. AFP: Las tres letras que revolucionan el mundo. Edited by Corporación de Investigación, Estudio y Desarrollo de la Seguridad Social. 2nd ed. Santiago de Chile: Corporación de Investigación, Estudio y Desarrollo de la Seguridad Social, 1999.
Find full textDadalko, Vasiliy, Vladimir Avdiyskiy, and Nikolay Sinyavskiy. The shadow economy and economic security of the state. ru: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/24758.
Full textOffice, General Accounting. ADP acquisitions : SSA should limit ADP procurements until further testing is performed: Report to the chairman, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1986.
Find full textOffice, General Accounting. ADP acquisitions : SSA should limit ADP procurements until further testing is performed: Report to the chairman, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1986.
Find full textOffice, General Accounting. ADP acquisitions : SSA should limit ADP procurements until further testing is performed: Report to the chairman, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1986.
Find full textOffice, General Accounting. ADP acquisitions : SSA should limit ADP procurements until further testing is performed: Report to the chairman, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1986.
Find full textOffice, General Accounting. ADP acquisitions : SSA should limit ADP procurements until further testing is performed: Report to the chairman, Committee on Government Operations, House of Representatives. Washington, D.C: The Office, 1986.
Find full textEduardo, Rodríguez Silva, ed. Examen crítico del sistema de AFP: Mitos y realidades. Santiago de Chile: Editorial Universitaria, 2002.
Find full text(Organization), Concertación por un Empleo Digno en la Maquila. Estudio sobre el cumplimiento de las reformas realizadas a la seguridad social (AFP-ISSS). San Salvador: Concertación por un Empleo Digno en la Maquila (CEDM), 2007.
Find full textInspector General Reform Act of 2007: Report of the Committee on Homeland Security and Governmental Affairs, United States Senate to accompany S. 2324, to amend the Inspector General Act of 1978 (5 U.S.C. APP.) to enhance the offices of the inspectors general, to create a council of the inspectors general on integrity and efficiency, and for other purposes. Washington: U.S. G.P.O., 2008.
Find full textVanMeter, Robert Andrew. Is hypertext a solution to implementing an ADP security program in DON?: Issues and problems. Monterey, Calif: Naval Postgraduate School, 1991.
Find full textUnited States. Social Security Administration. Technology Assessment and Forecasting Group. ADP voice technology: Speech recognition and speech synthesis. [Washington, D.C.?]: U.S. Social Security Administration, 1985.
Find full textUnited States. Social Security Administration. Technology Assessment and Forecasting Group. ADP voice technology: Speech recognition and speech synthesis. [Washington, D.C.?]: U.S. Social Security Administration, 1985.
Find full textOperations, Logical. CompTIA® Mobile App Security+ IOS Edition: 094102s. Logical Operations LLC, 2013.
Find full textOperations, Logical. CompTIA® Mobile App Security+ Android¿ Edition: 094101s. Logical Operations LLC, 2013.
Find full textOperations, Logical. CompTIA® Mobile App Security+ Android¿ Edition: 094101i. Logical Operations LLC, 2013.
Find full textOperations, Logical. CompTIA® Mobile App Security+ IOS Edition: 094102i. Logical Operations LLC, 2013.
Find full textStim, Richard. Protecting Your Mobile App IP: The Mini Missing Manual. O'Reilly Media, Incorporated, 2010.
Find full textStim, Richard. Protecting Your Mobile App IP: The Mini Missing Manual. O'Reilly Media, Incorporated, 2010.
Find full textThompson-Yvetot, Daniel, and Lucas Nogueira. Tauri Foundations: A Practical Introduction to the Tauri Framework and Adopting a Security-First Approach to App Development. Packt Publishing, Limited, 2022.
Find full textLakshmiraghavan, Badrinarayanan. Pro ASP.NET Web API Security: Securing ASP.NET Web API. Apress, 2013.
Find full textSantiago, Villalpando. 6 Responsibility, 6.6 Agim Behrami and Bekir Behrami v France , App. No. 71412/01 and Ruzhdi Saramati v France, Germany, and Norway , App. No. 78166/01, European Court of Human Rights, 2 May 2007. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198743620.003.0034.
Full text