 |
|
 Securing PHP Web ApplicationsIf you’re reading this, we know two things about you: First, you write PHP applications that run online. Second, you’re not a hard-core security guru. In fact, you’re probably holding this book right now because other security books left you with more questions than you started with, or because this is the first time you’ve... |  |  Programming .NET Compact Framework 3.5 (2nd Edition)WE FEEL PRETTY FORTUNATE. During the past three decades, we have traveled the world teaching programmers what we know. Between the two of us, we have led hundreds of classes and taught thousands of professional programmers. We enjoy working with the people who are inventing the future, andwehave been fortunate enough to have been at the cutting... |  |  TOAD Handbook (2nd Edition)TOAD Handbook is a guide for developing Oracle applications and administering Oracle databases with TOAD. Starting with installation and configuration, the book covers the TOAD SQL editors in depth, including dozens of helpful, undocumented features. Later chapters discuss reporting and exporting data and using several add-on tools designed to... |
|
 Python Essential Reference (4th Edition)Python Essential Reference is the definitive reference guide to the Python programming language — the one authoritative handbook that reliably untangles and explains both the core Python language and the most essential parts of the Python library.
Designed for the professional programmer, the book... |  |  PDF Reference: Version 1.4 (3rd Edition)The official guide to the Portable Document Format.
This book details the most current specification of Adobe Systems' Portable Document Format (PDF), the de facto standard for electronic information exchange. PDF enables documents created on any platform or with any application to be reliably viewed and printed anywhere. More... |  |  Chained Exploits: Advanced Hacking Attacks from Start to FinishThe complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve... |
|
|
 User Interface Design: A Software Engineering PerspectiveWhen you design the user interface to a computer system, you decide which screens the system will show, what exactly will be in each screen and how it will look. You also decide what the user can click on and what happens when he does so, plus all the other details of the user interface. It is the designer’s responsibility that the system has... |  |  Scaling Oracle8i(TM): Building Highly Scalable OLTP System ArchitecturesThis is a book about getting the most out of Oracle8i on UNIX systems. While many people understand how to administrate Oracle and UNIX, far fewer understand the issues and workings of the software and hardware, thus limiting the scalability of the system. This book aims to open up this essential information, enabling the reader to build faster,... |  |  Practical Cryptology and Web SecuritySecurity is now the number one concern for businesses world wide. The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web. ... |
|
| Result Page: 87 86 85 84 83 82 81 80 79 78 77 76 |