Books on the topic 'Web Applications; Storage; Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Web Applications; Storage; Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Lipyeow, Lim, Wang Wei, Li Chuan, Chen Lei, and SpringerLink (Online service), eds. Web-Age Information Management: 13th International Conference, WAIM 2012, Harbin, China, August 18-20, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textTesting Web security: Assessing the security of Web sites and applications. Indianapolis, Ind: Wiley, 2002.
Find full textSplaine, Steve. Testing web security: Assessing the security of web sites and applications. Indianapolis: Wiley, 2002.
Find full textMike, Shema, ed. Hacking exposed: Web applications. New York: McGraw-Hill/Osborne, 2002.
Find full textScambray, Joel. Hacking exposed: Web applications. New York: McGraw-Hill/Osborne, 2002.
Find full textThe tangled Web: A guide to securing modern Web applications. San Francisco: No Starch Press, 2011.
Find full textVincent, Liu, and Sima Caleb, eds. Hacking exposed: Web applications : web application security secrets and solutions. 3rd ed. New York: McGraw-Hill, 2011.
Find full textWang, Jianyong. Web-Age Information Management: 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textAndreu, Andres. Professional pen testing for Web applications. Indianapolis, Ind: Wiley Pub., 2006.
Find full textBill, Ballad, ed. Securing PHP web applications. Upper Saddle River, NJ: Addison-Wesley, 2009.
Find full textMike, Andrews, ed. How to break Web software: Functional and security testing of Web applications and Web services. Upper Saddle River, NJ: Addison-Wesley, 2006.
Find full textManolopoulos, Yannis. Advanced Signature Indexing for Multimedia and Web Applications. Boston, MA: Springer US, 2003.
Find full textIlchev, Svetozar. A new approach to data hiding for web-based applications. Sofia: Prof. Marin Drinov Academic Publishing House, 2014.
Find full text1974-, Nanopoulos Alexandros, and Tousidou Eleni 1974-, eds. Advanced signature indexing for multimedia and Web applications. Boston: Kluwer Academic, 2003.
Find full textInc, ebrary, ed. GlassFish security: Secure your GlassFish installation, web applications, EJB applications, application client module, and web services using Java EE and GlassFish security measures. Birmingham, U.K: Packt Open Source, 2010.
Find full textInc, ebrary, ed. ModSecurity 2.5: Securing your Apache installation and web applications. Birmingham, U.K: Packt Pub., 2009.
Find full textChryssanthou, Anargyros. Certification and security in health-related web applications: Concepts and solutions. Hershey PA: Medical Information Science Reference, 2011.
Find full textAnupama, Mallik, and Ghosh Hiranmay, eds. Multimedia ontology: Representation and applications. Boca Raton, Florida: CRC Press, 2016.
Find full textMarc, Levy, and Waymire Richard, eds. Designing secure web-based applications for Microsoft Windows 2000. Redmond, Wash: Microsoft Press, 2000.
Find full text1980-, Clark Chris, and Thiel David V, eds. Mobile application security: Protect mobile applications and devices from Web 2.0 attacks. New York: McGraw-Hill, 2010.
Find full textZhang, Liang-Jie. Web services research for emerging applications: Discoveries and trends. Hershey, PA: Information Science Reference, 2010.
Find full textHoward, Michael. Designing secure web-based applications for Microsoft Windows 2000. Redmond, Wash: Microsoft Press, 2000.
Find full textLorenzo, Martino, Paci Federica, Squicciarini Anna, and SpringerLink (Online service), eds. Security for Web Services and Service-Oriented Architectures. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2010.
Find full textThreat 2.0: Security and compliance for Web 2.0 sites. Ely, UK: IT Governance Pub., 2009.
Find full textHota, Chittaranjan. Distributed Computing and Internet Technology: 9th International Conference, ICDCIT 2013, Bhubaneswar, India, February 5-8, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textUnderstanding the Internet: A glimpse into the building blocks, applications, security and hidden secrets of the Web. Oxford, UK: Chandos Publishing, 2009.
Find full textNogueras, Iso Javier, Zarazaga-Soria F. Javier, and SpringerLink (Online service), eds. Terminological Ontologies: Design, Management and Practical Applications. Boston, MA: Springer Science+Business Media, LLC, 2010.
Find full textGudes, Ehud. Research Directions in Data and Applications Security: IFIP TC11. Boston, MA: Springer US, 2003.
Find full textP, Sheth Amit, and SpringerLink (Online service), eds. Geospatial Semantics and the Semantic Web: Foundations, Algorithms, and Applications. Boston, MA: Springer Science+Business Media, LLC, 2011.
Find full textIshikawa, Yoshiharu. Web Technologies and Applications: 15th Asia-Pacific Web Conference, APWeb 2013, Sydney, Australia, April 4-6, 2013. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.
Find full textGuoren, Wang, Jensen Christian S, Xu Guandong, and SpringerLink (Online service), eds. Web Technologies and Applications: 14th Asia-Pacific Web Conference, APWeb 2012, Kunming, China, April 11-13, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textBussler, Christoph. The Semantic Web: Research and applications : First European Semantic Web Symposium, ESWS 2004, Heraklion, Crete, Greece, May 10-12, 2004 : proceedings. Berlin: Springer, 2004.
Find full textMeersman, Robert. On the Move to Meaningful Internet Systems: OTM 2012: Confederated International Conferences: CoopIS, DOA-SVI, and ODBASE 2012, Rome, Italy, September 10-14, 2012. Proceedings, Part II. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textCeri, Stefano. Search Computing: Broadening Web Search. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Find full textSplaine, Steven. Testing Web Security: Assessing the Security of Web Sites and Applications. Wiley & Sons, Incorporated, John, 2002.
Find full textSchiller, Craig, and Jim Binkley. Botnets: The Killer Web Applications. Syngress, 2007.
Find full textWeb Application Security: Exploitation and Countermeasures for Modern Web Applications. O'Reilly Media, 2020.
Find full textWeb-Age Information Management: 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedings. Springer, 2013.
Find full textWang, Jianyong, Hui Xiong, and Yoshiharu Ishikawa. Web-Age Information Management: 14th International Conference, WAIM 2013, Beidaihe, China, June 14-16, 2013. Proceedings. Springer, 2013.
Find full textSecurity Strategies In Web Applications And Social Networking. Jones & Bartlett Publishers, 2010.
Find full textSecurity Strategies in Web Applications and Social Networking. Jones & Bartlett Learning, LLC, 2011.
Find full textHacking Exposed Web Applications, 2nd Ed. (Hacking Exposed). McGraw-Hill Osborne Media, 2006.
Find full textVacca, John R. Public Key Infrastructure: Building Trusted Applications and Web Services. AUERBACH, 2004.
Find full textNanopoulos, Alexandros, Yannis Manolopoulos, and Eleni Tousidou. Advanced Signature Indexing for Multimedia and Web Applications. Springer, 2012.
Find full text