Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
The Rails Way (Addison-Wesley Professional Ruby Series)
The Rails Way (Addison-Wesley Professional Ruby Series)
The expert guide to building Ruby on Rails applications

 

Ruby on Rails strips complexity from the development process, enabling professional developers to focus on what matters most: delivering business value. Now, for the first time, there’s a comprehensive,...

Hacking MySpace: Mods and Customizations to make MySpace Your Space
Hacking MySpace: Mods and Customizations to make MySpace Your Space
There are over 90 million profiles on MySpace. How do you makeYOURS stand out? You use these programming tricks and tech-niques to tweak the look, feel, and content of your profile. You getthe inside scoop on hotdesign and photography.You maximize the effects of HTML and CSS. And if you happen to be amusician, you check outChapter 30 to see...
Hacking Photoshop CS2
Hacking Photoshop CS2
You think you know Photoshop? Wait until you see how these over-the-top hacks and mods bring out its hidden power! Create a workflow customized for your specific needs. Superimpose type in half the time. Make Bridge work for you. Hack Camera Raw and get even more from your images. Print your projects without losing precision. When you can command...
The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Security Assessment: Case Studies for Implementing the NSA IAM
Security Assessment: Case Studies for Implementing the NSA IAM
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or...
RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Programming Linux Games
Programming Linux Games
Programming Linux Games discusses important multimedia toolkits (including a very thorough discussion of the Simple DirectMedia Layer) and teaches the basics of Linux game programming. Readers learn about the state of the Linux gaming world, and how to write and distribute Linux games to the Linux gaming community.

This book is
...
HTML & XHTML: The Definitive Guide (6th Edition)
HTML & XHTML: The Definitive Guide (6th Edition)

Put everthing you need to know about HTML & XHTML at your fingertips. For nearly a decade, hundreds of thousands of web developers have turned to HTML & XHTML: The Definitive Guide to master standards-based web development. Truly a definitive guide, the book combines a unique balance of...

Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios
Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios

"A solve-it-yourself mystery that will draw you in with entertaining, yet realistic scenarios that both challenge and inform you." --Tim Newsham, security research scientist, @stake, Inc.

Malicious hackers are everywhere these days, so how do you keep them out of your networks? This unique volume challenges your forensics and...

The Complete Idiot's Guide to Linux
The Complete Idiot's Guide to Linux
Complete Idiot's Guide To Linux, Second Edition, covers: Preparing to install the system, Using shells and online documentation, The X Windows graphical interface, Networking and Internet, Administration, Configuring Linux for multimedia , and A guide to available software and tools. If you have been wanting to get started using Linux, but are not...
Result Page: 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy