Home | Amazing | Today | Tags | Publishers | Years | Search 
Django Design Patterns and Best Practices
Django Design Patterns and Best Practices

Easily build maintainable websites with powerful and relevant Django design patterns

About This Book

  • Unravel the common problems of web development in Django
  • Learn the current best practices while working in Django 1.7 and Python 3.4
  • Experience the challenges of working on...
Smart Grid Security: Innovative Solutions for a Modernized Grid
Smart Grid Security: Innovative Solutions for a Modernized Grid

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power...

Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Web Application Security, A Beginner's Guide
Web Application Security, A Beginner's Guide

Security Smarts for the Self-Guided IT Professional

“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Oil and Security: A World beyond Petroleum (Topics in Safety, Risk, Reliability and Quality)
Oil and Security: A World beyond Petroleum (Topics in Safety, Risk, Reliability and Quality)
The celebration welcoming the second half of the 21st century on 31 December 2050 was subdued in the Persian Gulf. The major cities of Saudi Arabia, Kuwait, and others were dark. No fireworks or other signs of jubilation. Even those among them who had diversified their economies by investing in tourism, technology parks,...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed for malicious and illegal purposes has grown substantially. The 2011 Symantec Internet Security Threat Report announced that over 286 million new threats emerged in the past year....
Microsoft Windows Identity Foundation Cookbook
Microsoft Windows Identity Foundation Cookbook
I still remember sitting down with my brand new copy of Writing Secure Code by Michael Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web reports, (before the term "Bl" came to embody what at the time we thought was an incredibly innovative way to display call center metrics for managing...
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

Cryptography and Network Security
Cryptography and Network Security
The Internet, as a worldwide communication network, has changed our daily life in many ways. A new paradigm of commerce allows individuals to shop online. The World Wide Web (WWW) allows people to share information. The E-mail technology conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-...
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy