Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Hyperspectral Imaging: Techniques for Spectral Detection and Classification
Hyperspectral Imaging: Techniques for Spectral Detection and Classification

Hyperspectral Imaging: Techniques for Spectral Detection and Classification is an outgrowth of the research conducted over the years in the Remote Sensing Signal and Image Processing Laboratory (RSSIPL) at the University of Maryland, Baltimore County. It explores applications of statistical signal processing to hyperspectral...

Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Sustainable Horticulture, Volume 1: Diversity, Production, and Crop Improvement (Innovations in Horticultural Science)
Sustainable Horticulture, Volume 1: Diversity, Production, and Crop Improvement (Innovations in Horticultural Science)

Sustainable Horticulture, Volume 1: Diversity, Production, and Crop Improvements is part of a two-volume compendium that addresses the most important topics facing horticulture around the world today.

Volume 1, on Diversity, Production, and Crop Improvement, outlines the contemporary trends in sustainable...

Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
Augmented Reality: An Emerging Technologies Guide to AR
Augmented Reality: An Emerging Technologies Guide to AR
Augmented reality (AR) is a technology whose time has come. Conceived in rudimentary form as early as the 1960’s, AR is only now becoming truly practical. Recent advances in mobile processing, coupled with an explosion in digital storage capacity, ubiquity of wireless broadband connections, mass adoption of smart phones, and...
Practical Data Communications
Practical Data Communications
With the accelerating growth in the use of computers and PCs in the workplace, the practical aspects of designing and operating data communications systems have become increasingly more complex. Practical Data Communications provides the needed background and fills in the gaps for the many who must tackle this vital technology with little basic...
Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Bilingual Education and Minority Language Maintenance in China: The Role of Schools in Saving the Yi Language (Multilingual Education (31))
Bilingual Education and Minority Language Maintenance in China: The Role of Schools in Saving the Yi Language (Multilingual Education (31))
This book looks closely at Yi bilingual education practice in the southwest of China from an educationalist’s perspective and, in doing so, provides an insight toward our understanding of minority language maintenance and bilingual education implementation in China. The book provides an overview on the Yi people since 1949, their history,...
Practical SQL: A Beginner's Guide to Storytelling with Data
Practical SQL: A Beginner's Guide to Storytelling with Data

Practical SQL is an approachable and fast-paced guide to SQL (Structured Query Language), the standard programming language for defining, organizing, and exploring data in relational databases. The book focuses on using SQL to find the story your data tells, with the popular open-source database PostgreSQL and the pgAdmin interface as...

Penetration Testing: Procedures & Methodologies
Penetration Testing: Procedures & Methodologies

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Result Page: 82 81 80 79 78 77 76 75 74 73 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy