Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Application Defender's Cookbook: Battling Hackers and Protecting Users
Web Application Defender's Cookbook: Battling Hackers and Protecting Users

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you...

Generation Xbox: How Videogames Invaded Hollywood
Generation Xbox: How Videogames Invaded Hollywood

Hollywood is under attack from videogames. Movies defined the 20th century but games are now pushing them aside as the medium that captures our time, fascination and money. Generation Xbox digs into the love-hate relationship between games and cinema that has led us to this point. It's a story of disaster, triumph and Angelia Jolie in hot...

The High-Velocity Edge: How Market Leaders Leverage Operational Excellence to Beat the Competition
The High-Velocity Edge: How Market Leaders Leverage Operational Excellence to Beat the Competition

Generate Better, Faster Results— Using Less Capital and Fewer Resources!

“[The High-Velocity Edge] contains ideas that form the basis for structured continuous learning and improvement in every aspect of our lives. While this book is tailored to business leaders, it should be read by high school seniors,...

Handbook of Operations Research for Homeland Security
Handbook of Operations Research for Homeland Security

This new Handbook addresses the state of the art in the application of operations research models to problems in preventing terrorist attacks, planning and preparing for emergencies, and responding to and recovering from disasters. The purpose of the book is to enlighten policy makers and decision makers about the power of operations research...

Node Security
Node Security

Take a deep dive into the world of securing your Node applications with Node Security

Overview

  • Examine security features and vulnerabilities within JavaScript
  • Explore the Node platform, including the event-loop and core modules
  • Solve common security problems with available...
Vmware Vcloud Security
Vmware Vcloud Security

Welcome to VMware vCloud Security. In this book, you will learn how to mitigate  the security threats on a private cloud running VMware vCloud Director. This  book will enable the reader with the knowledge, skills, and abilities to build a  highly secured private cloud running VMware vCloud. We will also look at a ...

Web Application Obfuscation
Web Application Obfuscation

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web...

What Every Engineer Should Know About Cyber Security and Digital Forensics
What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be protected by security guards, cipher locks, and an ID badge worn by all employees. As the computing paradigm is continually changing with shared resources and mobility, firewalls and antivirus software are also not enough to protect critical assets. This...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Intrusion Detection in Wireless Ad-Hoc Networks
Intrusion Detection in Wireless Ad-Hoc Networks

Presenting cutting-edge research, Intrusion Detection in Wireless Ad-Hoc Networks explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it explains how to establish security solutions for the range of wireless networks, including...

501 Killer Marketing Tactics to Increase Sales, Maximize Profits, and Stomp Your Competition: Revised and Expanded Second Edition
501 Killer Marketing Tactics to Increase Sales, Maximize Profits, and Stomp Your Competition: Revised and Expanded Second Edition

Bigger, Badder, Better!
ATTACK OF THE KILLER MARKETING TACTICS!

A few years back, marketing super-guru Tom Feltenstein in rewrote the book on high-impact marketing that works. Fast-forward to today and new technologies, more sophisticated consumers/competitors, and a whole new media...

How to Motivate Every Employee: 24 Proven Tactics to Spark Productivity in the Workplace (The McGraw-Hill Professional Education Series)
How to Motivate Every Employee: 24 Proven Tactics to Spark Productivity in the Workplace (The McGraw-Hill Professional Education Series)

This title provides 24 ways to motivate every employee. Think about the managers who most influenced your career. They were successful because they infused employees - and organizations - with passion for work and motivation to achieve. "24 Ways to Motivate Every Employee" provides two dozen creative and ready-to-use tools and...

Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy