Mastering Modern Web Penetration Testing
This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
Penetrate and secure your web application using various techniques
Get this comprehensive
Beginning Android 4 (Beginning Apress)
Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars, in in-flight entertainment systems on planes, and even in
However, the general theme of Android devices will be smaller screens and/or no
hardware keyboard. And, by the numbers, Android...
Spatial Augmented Reality: Merging Real and Virtual Worlds
Like virtual reality, augmented reality is becoming an emerging platform in new application areas for museums, edutainment, home entertainment, research, industry, and the art communities using novel approaches which have taken augmented reality beyond traditional eye-worn or hand-held displays.
In this book, the authors discuss spatial...
Principles of Cybercrime
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...
Microsoft Visual C++ .NET Step by Step - Version 2003
Teach yourself the latest version of Visual C++--and begin developing for Microsoft .NET—one step at a time. This practical, hands-on tutorial expertly guides you through the fundamentals—from writing managed code to running and debugging your first .NET-based applications and XML Web services. Work at your own pace through...
Writing GNU Emacs Extensions
Yes, it is possible to be all things to all people, if you're talking about the Emacs editor. As a user, you can make any kind of customization you want, from choosing the keystrokes that invoke your favorite commands to creating a whole new work environment that looks like nothing ever developed before. It's all in Emacs Lisp -- and...
Iris Biometric Model for Secured Network Access
In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.
Iris Biometric Model for Secured Network Access proposes a...
Pro OpenSolaris OpenSolaris is a rapidly evolving operating system with roots in Solaris 10, suitable for deployment on laptops, desktop workstations, storage appliances, and data center servers from the smallest single–purpose systems to the largest enterprise–class systems. The growing OpenSolaris community now has hundreds of thousands of...
|Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 |