|
|
|
|
|
XML and Web Services UnleashedThe Extensible Markup Language is changing the way that information is being stored and exchanged. It is also changing the very way that we think about data. XML Unleashed allows you to unlock this new power and get you well on your way towards developing XML applications and systems that enable your most important business processes, or your... | | | | Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... |
|
|
Juniper(r) Networks Secure Access SSL VPN Configuration GuideJuniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for... | | | | Ew 103, Tactical Battlefield communications Electronic WarfareThis is the third book in the EW 100 series. Like the two earlier books, it is based on the EW 101 series of tutorial articles in the Journal of Electronic Defense. However, this book focuses on the practical aspects of electronic warfare against enemy communications signals
The target audiences for this book, like the earlier two, are... |
|
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |