Programming Books C Java PHP Python Learn more Browse Programming Books
Out of Print--Limited Availability.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Pro Windows 7 Multitouch and Microsoft Surface Development Paperback – July 31, 2011

ISBN-13: 978-1430224655 ISBN-10: 1430224657 Edition: 1st

See all 4 formats and editions Hide other formats and editions
Amazon Price New from Used from Collectible from
Kindle
"Please retry"
Paperback, July 31, 2011

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student



Special Offers and Product Promotions

  • Have the next big idea for a movie? Submit a 2-15 min. concept video to Amazon Studios for a chance to have your movie made. Learn more.


NO_CONTENT_IN_FEATURE

Sell Your Books
Get up to 75% back when you sell your books on Amazon. Ship your books for free and get Amazon.com Gift Cards. Learn more.

Product Details

  • Series: Pro
  • Paperback: 300 pages
  • Publisher: Apress; 1 edition (July 31, 2011)
  • Language: English
  • ISBN-10: 1430224657
  • ISBN-13: 978-1430224655
  • Average Customer Review: 3.3 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #11,419,703 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

David Reeves is a senior architect for Moxie Interactive in Atlanta, Georgia, and has been developing applications on various platforms for more than 15 years. With experience across multiple platforms including PCs, browsers, digital kiosks, and mobile devices (such as Windows Mobile and iPhone), David brings a unique perspective to developing rich, engaging applications.


More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

3.3 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

Format: Paperback Verified Purchase
For an upcoming certification test, I had to review security and encryption issues tied to SQL Server 2012. Generally, I do more development, so this level of security is something I do not have much experience with. However, after reviewing the MSDN site and others, I was needing something a little more accessible for newbies.

Granted, while this is geared towards 2008, the database objects and functions discussed are still pretty valid.

And yes, while differences exist between the 2008 and 2012 security/encryption objects, I would still recommend this to someone new to this aspect of SQL Server.

In all honesty, this is a pretty good SQL book and worth having.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By Russ on August 9, 2013
Format: Paperback Verified Purchase
It's ok to get stared. I didn't get enough out of it to really trust moving forward with encryption as it left more questions than answers.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
"What is your opinion on encryption? What I mean is: In a world filled with data, how do you see encryption?" This is the precise question Michael Coles posed to me on March 3rd of this year, while we were heading to Starbucks in Seattle. We were both attending the Microsoft MVP Summit there.

In the information era, security has become one of the most vital aspects of life. Although the topic may seem a little mundane, its importance cannot be overemphasized. It is the pillar of the information age and I shudder to think where we would be without it. We don't leave our houses unlocked and risk thieves or opportunists taking off with our valuables. We also often take precautions, not only to preserve the precious, but also to avoid the sheer hassle of replacement and misuse. So too it should be with our information.

Encryption's roots are extremely old and it has resolved numerous security problems over the years. In days gone by, couriers were entrusted with letters sealed with a royal wax stamp. If on delivery, the seal was broken, it was obvious that there had been a security breach. This very concept evolved as CRC checksum and developed into a complex algorithm. While CRC checksum alerted the end user to the fact that content had been modified, its limitation was that it allowed manipulation of the content to occur in the first place. With encryption, only the authenticated owner can access and modify content.

In response to Michael's question, I began to tell him what I knew about public and private keys. He looked at me doubtfully and asked me directly if I had ever used encryption in my career. My reluctant answer to this was "No". He strongly suggested that I not underestimate its capabilities and explore its possibilities.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Product Images from Customers

Search
ARRAY(0xa39ede88)

What Other Items Do Customers Buy After Viewing This Item?