|
|
|
|
|
|
Learning Pentesting for Android Devices
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the... | | Penetration Testing with BackBox
This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox.
Overview
-
Experience the real world of penetration testing with Backbox Linux using...
| | Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data ... |
|
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |