![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
Showing 1 - 1 of 1 matches in All Departments
The purpose of this document is to provide an overview of active content and mobile code technologies in use today and offer insights for making informed IT security decisions on their application and treatment. The discussion gives details about the threats, technology risks, and safeguards for end user systems, such as desktops and laptops. Although various end user applications, such as email clients, can involve active content, Web browsers remain the primary vehicle for delivery and are underscored in the discussion. The tenets presented for Web browsers apply equally well to other end user applications and can be inferred directly.
|
You may like...
Handbook of Evidence in International…
Franco Ferrari, Friedrich Rosenfeld
Hardcover
R5,566
Discovery Miles 55 660
The DIS Arbitration Rules - An…
Gustav Flecke-Giammarco, Christopher Boog, …
Hardcover
R5,933
Discovery Miles 59 330
Machine Learning for Intelligent…
Jitendra Kumar Rout, Minakhi Rout, …
Hardcover
R4,247
Discovery Miles 42 470
|