Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Microsoft Ole Db 2.0 Programmer's Reference and Data Access Sdk (Microsoft Professional Editions)
Microsoft Ole Db 2.0 Programmer's Reference and Data Access Sdk (Microsoft Professional Editions)
rogrammers understand how to build business applications that exploit all the organization's information resources-in whatever form and from wherever they reside in the enterprise-with Microsoft's powerful OLE DB 2.0 technology. This kit packages complete information and tools to create universal data access for all Windows(r)- and Windows...
Beginning Android 4 (Beginning Apress)
Beginning Android 4 (Beginning Apress)

Android is everywhere. Phones. Tablets. TVs and set-top boxes powered by Google TV. Soon, Android will be in cars, in in-flight entertainment systems on planes, and even in

robots!

However, the general theme of Android devices will be smaller screens and/or no hardware keyboard. And, by the numbers, Android
...
Game Programming Using QT
Game Programming Using QT

A complete guide to designing and building fun games with Qt and Qt Quick 2 using associated toolsets

About This Book

  • Learn to create simple 2D to complex 3D graphics and games using all possible tools and widgets available for game development in Qt
  • Understand technologies such as QML,...
The Power PC Compiler Writer's Guide
The Power PC Compiler Writer's Guide
This book describes, mainly by coding examples, the code patterns that perform well on PowerPC processors. The book will be particularly helpful to compiler developers and application-code specialists who are already familiar with optimizing compiler technology and are looking for ways to exploit the PowerPC architecture. It will also be helpful to...
The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Spatial Augmented Reality: Merging Real and Virtual Worlds
Spatial Augmented Reality: Merging Real and Virtual Worlds

Like virtual reality, augmented reality is becoming an emerging platform in new application areas for museums, edutainment, home entertainment, research, industry, and the art communities using novel approaches which have taken augmented reality beyond traditional eye-worn or hand-held displays.

In this book, the authors discuss spatial...

Principles of Cybercrime
Principles of Cybercrime

We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every...

Microsoft Visual C++ .NET Step by Step - Version 2003
Microsoft Visual C++ .NET Step by Step - Version 2003

Teach yourself the latest version of Visual C++--and begin developing for Microsoft .NET—one step at a time. This practical, hands-on tutorial expertly guides you through the fundamentals—from writing managed code to running and debugging your first .NET-based applications and XML Web services. Work at your own pace through...

Writing GNU Emacs Extensions
Writing GNU Emacs Extensions

Yes, it is possible to be all things to all people, if you're talking about the Emacs editor. As a user, you can make any kind of customization you want, from choosing the keystrokes that invoke your favorite commands to creating a whole new work environment that looks like nothing ever developed before. It's all in Emacs Lisp -- and...

Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Pro OpenSolaris
Pro OpenSolaris
OpenSolaris is a rapidly evolving operating system with roots in Solaris 10, suitable for deployment on laptops, desktop workstations, storage appliances, and data center servers from the smallest single–purpose systems to the largest enterprise–class systems. The growing OpenSolaris community now has hundreds of thousands of...
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy