Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
God's Arbiters: Americans and the Philippines, 1898-1902 (Imagining the Americas)
God's Arbiters: Americans and the Philippines, 1898-1902 (Imagining the Americas)

When the U.S. liberated the Philippines from Spanish rule in 1898, the exploit was hailed at home as a great moral victory, an instance of Uncle Sam freeing an oppressed country from colonial tyranny. The next move, however, was hotly contested: should the U.S. annex the archipelago? The disputants did agree on one point: that the United...

Visual Basic .NET Tips & Techniques
Visual Basic .NET Tips & Techniques

300+ Immediate Solutions from the Pros

Quickly take advantage of Visual Basic .NET to implement a wide range of programming tasks. Packed with practical advice and hundreds of ready-to-run programs, this powerful resource will show you how to maximize the .NET environment to create professional-quality real-world solutions. Covers key...

Algorithms: Sequential, Parallel, and Distributed
Algorithms: Sequential, Parallel, and Distributed
The objectives of this book are to provide a solid foundation for the classical the ory of sequential algorithms and to cover some of the most important recent al gorithmic developments, including the rapidly advancing theory of parallel and distributed algorithms. The book is intended to serve as a text for a core upper...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Feedback Strategies for Wireless Communication
Feedback Strategies for Wireless Communication

This book explores the different strategies regarding limited feedback information. The book analyzes the impact of quantization and the delay of CSI on the performance. The author shows the effect of the reduced feedback information and gives an overview about the feedback strategies in the standards. This volume presents theoretical...

Java 9 Recipes: A Problem-Solution Approach
Java 9 Recipes: A Problem-Solution Approach

Quickly find solutions to dozens of common programming problems encountered while building Java applications. Content is presented in the popular problem-solution format. Look up the programming problem that you want to resolve. Read the solution. Apply the solution directly in your own code. Problem solved!

This...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
SOA Patterns with BizTalk Server 2009
SOA Patterns with BizTalk Server 2009

SOA is about architecture, not products and SOA enables you to create better business processes faster than ever. While BizTalk Server 2009 is a powerful tool, by itself it cannot deliver long-lasting, agile solutions unless we actively apply tried and tested service-oriented principles.

The current BizTalk Server books are all for the...

Spectroscopy and Optical Diagnostics for Gases
Spectroscopy and Optical Diagnostics for Gases

This text provides an introduction to the science that governs the interaction of light and matter (in the gas phase). It provides readers with the basic knowledge to exploit the light-matter interaction to develop quantitative tools for gas analysis (i.e. optical diagnostics) and understand and interpret the results of spectroscopic...

Cocoon Developer's Handbook (Developer's Library)
Cocoon Developer's Handbook (Developer's Library)
Cocoon is one of the showpieces of the Apache XML project. It is a powerful framework that allows developers to more efficiently set up, create, and maintain sophisticated Web-oriented applications. It has attracted widespread attention because it solves a substantial problem for Web developers. Yet Cocoon's reliance on a wide array of open source...
Enterprise 2.0
Enterprise 2.0

The notion that the corporation is changing fundamentally has been around for decades – dating back to Peter Drucker’s seminal work in the 1980s on ‘The New Organization’. In 1992, I discussed what I called ‘The New Enterprise’ in my book Paradigm Shift, saying ‘the corporation of old simply...

Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy