|
|
|
|
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context... | | Pattern Recognition with Neural Networks in C++Why do we feel a need to write a book about pattern recognition when many excellent books are already available on this classical topic? The answer lies in the depth of our coverage of neural networks as natural pattern classifiers and clusterers. Artificial neural network computing has emerged as an extremely active research area with a central... | | Managing and Mining Graph Data (Advances in Database Systems)Managing and Mining Graph Data is a comprehensive survey book in graph data analytics. It contains extensive surveys on important graph topics such as graph languages, indexing, clustering, data generation, pattern mining, classification, keyword search, pattern matching, and privacy. It also studies a number of domain-specific... |
|
|
|
|
Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 |