|
|
|
|
Node Security
Take a deep dive into the world of securing your Node applications with Node Security
Overview
-
Examine security features and vulnerabilities within JavaScript
-
Explore the Node platform, including the event-loop and core modules
-
Solve common security problems with available...
| | Hacking the Human
Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of... | | Digital Privacy and Security Using Windows: A Practical Guide
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.
This book teaches you how to secure your online identity and personal... |
|
Intrusion Prevention and Active Response : Deploying Network and Host IPSFrom the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute
Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be... | | SQL Antipatterns: Avoiding the Pitfalls of Database Programming
Each chapter in this book helps you identify, explain, and correct a unique and dangerous antipattern. The four parts of the book group the anti?patterns in terms of logical database design, physical database design, queries, and application development.
The chances are good that your application's database... | | Perl Debugged"This book was a joy to read. It covered all sorts of techniques for debugging, including 'defensive' paradigms that will eliminate bugs in the first place. As coach of the USA Programming Team, I find the most difficult thing to teach is debugging. This is the first text I've even heard of that attacks the problem. It does a fine job. Please... |
|
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Lock down next-generation Web services
"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
... | | Asthma: The Biography (Biographies of Diseases)
Asthma is a familiar and growing disease today, but its story goes back to the ancient world, as we know from accounts in ancient texts from China, India, Greece and Rome. It was treated with acupuncture and Ayurveda.
As Western medicine developed, the nature of asthma became clearer, and its basis in the lungs recognized.... | | Cyber Security Essentials
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and... |
|
|
|
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 |