Mastering Modern Web Penetration Testing
This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
Penetrate and secure your web application using various techniques
Get this comprehensive
Hyperspectral Imaging: Techniques for Spectral Detection and Classification
Hyperspectral Imaging: Techniques for Spectral Detection and Classification is an outgrowth of the research conducted over the years in the Remote Sensing Signal and Image Processing Laboratory (RSSIPL) at the University of Maryland, Baltimore County. It explores applications of statistical signal processing to hyperspectral...
Linux All-in-One Desk Reference For Dummies (Computer/Tech) 8 books in 1— your key to success with Linux!
Your one-stop guide to working with various Linux distributions
Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...
Perimeter Security Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource... Sustainable Horticulture, Volume 1: Diversity, Production, and Crop Improvement (Innovations in Horticultural Science)
Sustainable Horticulture, Volume 1: Diversity, Production, and Crop Improvements is part of a two-volume compendium that addresses the most important topics facing horticulture around the world today.
Volume 1, on Diversity, Production, and Crop Improvement, outlines the contemporary trends in sustainable...
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary
form as early as the 1960’s, AR is only now becoming truly practical. Recent
advances in mobile processing, coupled with an explosion in digital storage capacity,
ubiquity of wireless broadband connections, mass adoption of smart phones, and... Practical Data Communications With the accelerating growth in the use of computers and PCs in the workplace, the practical aspects of designing and operating data communications systems have become increasingly more complex. Practical Data Communications provides the needed background and fills in the gaps for the many who must tackle this vital technology with little basic... Cybersecurity Law
A definitive guide to cybersecurity law
Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...
|Result Page: 82 81 80 79 78 77 76 75 74 73 |