![]() |
![]() |
Your cart is empty |
||
Showing 1 - 1 of 1 matches in All Departments
The purpose of this document is to provide an overview of active content and mobile code technologies in use today and offer insights for making informed IT security decisions on their application and treatment. The discussion gives details about the threats, technology risks, and safeguards for end user systems, such as desktops and laptops. Although various end user applications, such as email clients, can involve active content, Web browsers remain the primary vehicle for delivery and are underscored in the discussion. The tenets presented for Web browsers apply equally well to other end user applications and can be inferred directly.
|
![]() ![]() You may like...
Pearson REVISE AQA GCSE Spanish Revision…
Vivien Halksworth, Leanda Reeves
Paperback
![]() R272 Discovery Miles 2 720
Regional Analysis and Policy - The Greek…
Harry Coccossis, Yannis Psycharis
Hardcover
R2,937
Discovery Miles 29 370
Innovation - Shaping South Africa…
Gordon Institute of Business Science, Sarah Wild
Paperback
|