Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Securing PHP Apps
Securing PHP Apps

Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.

Is your PHP app truly secure? Let's make sure you get home...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Data-Driven Security: Analysis, Visualization and Dashboards
Data-Driven Security: Analysis, Visualization and Dashboards

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to...

iPad and iPhone Kung Fu: Tips, Tricks, Hints, and Hacks for iOS 7
iPad and iPhone Kung Fu: Tips, Tricks, Hints, and Hacks for iOS 7

Printed in full color.

A shortcut straight to power-user level with over 300 tips, tricks, hints, and hacks to make your Apple device the one thing you can't live without. Learn the secrets of FaceTime, Maps, Safari, and Mail. Transform your Apple device into a go-to office tool, as well as tighten security to
...

The Definitive Guide to Django: Web Development Done Right, Second Edition
The Definitive Guide to Django: Web Development Done Right, Second Edition
This latest edition of The Definitive Guide to Django is updated for Django 1.1, and, with the forward–compatibility guarantee that Django now provides, should serve as the ultimate tutorial and reference for this popular framework for years to come.

Django, the Python–based equivalent to Ruby’s Rails web development...

Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Pro HTML5 and CSS3 Design Patterns (Professional Apress)
Pro HTML5 and CSS3 Design Patterns (Professional Apress)

This is a solutions book for styling HTML5 with CSS3. It contains more than 350 design patterns you can put to use right away. Each design pattern is modular and customizable, and you can combine patterns to create an unlimited number of designs.

Each design pattern has been thoroughly tested and proven to work in all major web...

Google Analytics, 3rd Edition
Google Analytics, 3rd Edition

With 2 billion sites on the Web, who's looking at yours?

Google Analytics can tell you. With great new features including advanced customization and segmentation capabilities, Analytics supplies information about your site visitors that helps you ramp up the value of your site. And like its two previous editions, this guide...

Word Hacks : Tips & Tools for Taming Your Text
Word Hacks : Tips & Tools for Taming Your Text

Few software applications are as ubiquitous as Microsoft Word, which has been around for more than 20 years—practically an eternity in computer time. Even as competitors, such as OpenOffice.org, emerge from the open source community, their success relies heavily on how much they look and act like Word. When most people...

Knoppix Hacks : 100 Industrial-Strength Tips and Tools
Knoppix Hacks : 100 Industrial-Strength Tips and Tools
Knoppix Hacks is an invaluable collection of one hundred industrial-strength hacks for new Linux users, power users, and system administrators using--or considering using--the Knoppix Live CD. These tips and tools show how to use the enormous amount of software on this live CD to troubleshoot, repair, upgrade,...
Result Page: 21 20 19 18 17 16 15 14 13 12 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy