Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
2012
Protecting Confidential Information: How to Securely Store Sensitive Data Protecting Confidential Information: How to Securely Store Sensitive Data
2012
Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server
2012
Hacking Point of Sale Hacking Point of Sale
2014
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012