 |
|
 Securing SQL Server: Protecting Your Database from Attackers
As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to... |  |  BackTrack 4: Assuring Security by Penetration Testing
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your... |  |  iOS Recipes: Tips and Tricks for Awesome iPhone and iPad Apps
Our goal as programmers is to solve problems. Sometimes the problems are hard, sometimes they’re easy, and sometimes they’re even fun. Maybe they’re not even “problems” in the colloquial sense of the word, but we are there to solve them.
Our goal as authors is to help you solve your problems... |
|
 A Guide to Kernel Exploitation: Attacking the Core
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop... |  |  Beginning Oracle Application Express 4
Welcome to the wonderful world of Oracle Application Express (APEX). You’re about to learn how to use a tool that we believe will revolutionize the way you think about and approach writing web-based Oracle systems. It certainly has for us.
Prior to the advent of APEX, developing fully interactive web based systems over data... |  |  Visual C# Game Programming for Teens
Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the... |
|
 E-Mail Security: A Pocket Guide
E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,... |  |  Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |  |  Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
It is a great pleasure for me to write this foreword about a book that comes out
of one of the first research projects funded by ANR, the French National Research
Agency. ANR was established by the French government in 2005 to fund research
projects, based on competitive schemes giving researchers the best opportunities to
realize... |
|
|
| Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |