 |
|
|
|
|
 Using the HTML5 Filesystem API
Several client-side storage options are available to web applications, but one area that's been lacking until now is file I/O—the ability to organize binary data into a true hierarchy of folders. That has changed with the advent of HTML5. With this book, you'll learn how to provide your applications with a file system... |  |  Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 |