|
|
|
|
Mastering Modern Web Penetration Testing
Key Features
-
This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
-
Penetrate and secure your web application using various techniques
-
Get this comprehensive
... | | The Mac Hacker's HandbookAs more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat... | | Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.
Overview
-
Learn how mobile devices are monitored and the impact of cloud computing
... |
|
|
|
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 |