Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Essential PHP Tools: Modules, Extensions, and Accelerators
Essential PHP Tools: Modules, Extensions, and Accelerators

This book is an essential guide to some of the best free add-ons to PHP. These add-ons, or tools, provide invaluable functionality for improving your PHP web applications, including accessing databases, generating robust Web forms, using page templating systems, creating and parsing XML documents, authenticating users, and much more.

...

Essential PHP Security
Essential PHP Security

Being highly flexible in building dynamic, database-driven web applications makes the PHP programming language one of the most popular web development tools in use today. It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in...

Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Cisco Router Firewall Security
Cisco Router Firewall Security

The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches...

Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000
Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000

Although numerous books on security are available, many of them cover only theory or perhaps a security silo—that is, an island of security based on a particular tool, application, or technology. It should be obvious that no complete security solution is a silo; all secure business applications touch many tools and many technologies. Also,...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

Inside Java(TM) 2 Platform Security, the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java...

Developing Web Applications with ASP.NET and C#
Developing Web Applications with ASP.NET and C#
Learn how to create an entire suite of enterprise applications with ASP.NET and C#

ASP.NET is a vast improvement over Microsoft’s popular Web technology, Active Server Pages (ASP). And, when combined with C#, Microsoft’s new and powerful programming language, ASP.NET provides developers with a robust framework for enterprise-level...

Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Cryptography for Developers
Cryptography for Developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively.

The book begins with a chapter that introduces the subject of cryptography to the reader. The second chapter discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms The subsequent
...
Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
unlimited object storage image
Result Page: 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy