|
|
|
|
Special Edition Using Perl 5 for Web ProgrammingBack in 1986, a UNIX programmer by the name of Larry Wall found himself working on a task that involved generating reports from a great many text files, with cross-references. Because he was a UNIX programmer, and because the problem involved manipulating the contents of text files, he started to use awk for the task. But it soon became clear that... | | | | |
|
|
Linksys WRT54G Ultimate HackingThis book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the... | | The Zope Book (Landmark)The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope... | | Building a Cisco Wireless LANWireless LAN (Wi-Fi) technology is significantly more complex than cordless telephony; loss, coverage, and bandwidth requirements are much more stringent and the proliferation of wireless LANs in corporate environments has resulted in interesting security challenges. IEEE 802.11-based products offered by Cisco Systems have quickly become one of the... |
|
Hack Proofing Your Ecommerce SiteHack Proofing Your E-Commerce Site was written in response to requests from readers of our first book, Hack Proofing Your Network: Internet Tradecraft. Many of you asked us for more detail on how to protect e-commerce sites, given the unique risk and exposure such... | | Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known
as black hats, are preying on information systems of government, corporate, public, and private networks and... | | Hack Proofing Your Network (Second Edition)This book is intended to teach skills that will be useful for breaking into computers. If that statement shocks you, then you probably aren’t familiar with the legitimate reasons for hacking.These reasons can be security testing, consumer advocacy and civil rights, military interests, and “hacktivist” politics;... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |