|
|
|
|
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Lock down next-generation Web services
"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
... | | | | Teach Yourself Cgi Programming With Perl in a Week (Sams Teach Yourself)
From there, you will learn about the basic client/server architecture of the server, and you will
get a detailed description of the HTTP request/response headers. You will learn the client/server
model in straightforward and simple terms, and throughout the book, you will learn about
several methods for keeping track of the state of... |
|
Honeypots for Windows (The Experts Voice)Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help. But Honeypots for Windows is a forensic journey—helping you set up... | | Hacking: The Art of ExploitationThis text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.
Hacking is the art of creating problem solving, whether used to find an unconventional solution to... | | Invasion of Privacy! Big Brother and the Company HackersPop-up ads, cookies, spyware, spam, junk mail, telemarketing calls. Rapidly evolving technology has made you a target and your personal information a desirable commodity. Your profile is out there and it’s available not just to the highest bidder, but to every bidder. Technology, advertising, the media, and government have converged to... |
|
|
|
|
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |