|
|
|
|
|
|
Unauthorised Access: Physical Penetration Testing For IT Security Teams
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application... | | The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context... | | Fitness for Geeks: Real Science, Great Nutrition, and Good Health
This inquisitive and highly useful book shows the hacker and maker communities how to bring science and software into their nutrition and fitness routines.
The digital age has made a big splash with new web-connected gear in the sports/fitness world. Fitness for Geeks covers many of these new self-tracking ... |
|
Two Scoops of Django: Best Practices For Django 1.5
Update!
The third edition, Two Scoops of Django: Best Practices For Django 1.8 is available! Revised and expanded to 532 pages, it's a whole new book full of new material. Please consider it before purchasing this edition!
http://www.amazon.com/Two-Scoops-Django-Best-Practices/dp/0981467342 ... | | Hacking: The Art of Exploitation, 2nd EditionHacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.
Rather than merely showing how to run existing exploits,... | | BackTrack 4: Assuring Security by Penetration Testing
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your... |
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 |