Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your email address or mobile phone number.

Pro Windows 7 Multitouch and Microsoft Surface Development 1st Edition

3.3 out of 5 stars 3 customer reviews
ISBN-13: 978-1430224655
ISBN-10: 1430224657
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
This book is not available.
Out of Print--Limited Availability.
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Save Up to 90% on Textbooks Textbooks

Editorial Reviews

About the Author

David Reeves is a senior architect for Moxie Interactive in Atlanta, Georgia, and has been developing applications on various platforms for more than 15 years. With experience across multiple platforms including PCs, browsers, digital kiosks, and mobile devices (such as Windows Mobile and iPhone), David brings a unique perspective to developing rich, engaging applications.

NO_CONTENT_IN_FEATURE



Product Details

  • Series: Pro
  • Paperback: 300 pages
  • Publisher: Apress; 1 edition (July 31, 2011)
  • Language: English
  • ISBN-10: 1430224657
  • ISBN-13: 978-1430224655
  • Shipping Weight: 1.5 pounds
  • Average Customer Review: 3.3 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #14,273,522 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Top Customer Reviews

Format: Paperback Verified Purchase
For an upcoming certification test, I had to review security and encryption issues tied to SQL Server 2012. Generally, I do more development, so this level of security is something I do not have much experience with. However, after reviewing the MSDN site and others, I was needing something a little more accessible for newbies.

Granted, while this is geared towards 2008, the database objects and functions discussed are still pretty valid.

And yes, while differences exist between the 2008 and 2012 security/encryption objects, I would still recommend this to someone new to this aspect of SQL Server.

In all honesty, this is a pretty good SQL book and worth having.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
It's ok to get stared. I didn't get enough out of it to really trust moving forward with encryption as it left more questions than answers.
Comment 0 of 1 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
"What is your opinion on encryption? What I mean is: In a world filled with data, how do you see encryption?" This is the precise question Michael Coles posed to me on March 3rd of this year, while we were heading to Starbucks in Seattle. We were both attending the Microsoft MVP Summit there.

In the information era, security has become one of the most vital aspects of life. Although the topic may seem a little mundane, its importance cannot be overemphasized. It is the pillar of the information age and I shudder to think where we would be without it. We don't leave our houses unlocked and risk thieves or opportunists taking off with our valuables. We also often take precautions, not only to preserve the precious, but also to avoid the sheer hassle of replacement and misuse. So too it should be with our information.

Encryption's roots are extremely old and it has resolved numerous security problems over the years. In days gone by, couriers were entrusted with letters sealed with a royal wax stamp. If on delivery, the seal was broken, it was obvious that there had been a security breach. This very concept evolved as CRC checksum and developed into a complex algorithm. While CRC checksum alerted the end user to the fact that content had been modified, its limitation was that it allowed manipulation of the content to occur in the first place. With encryption, only the authenticated owner can access and modify content.

In response to Michael's question, I began to tell him what I knew about public and private keys. He looked at me doubtfully and asked me directly if I had ever used encryption in my career. My reluctant answer to this was "No". He strongly suggested that I not underestimate its capabilities and explore its possibilities.
Read more ›
Comment 6 of 13 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse