Securing PHP Apps
Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.
Is your PHP app truly secure? Let's make sure you get home...
Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques
About This Book
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
Become an expert in cracking WiFi...
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Build a better defense against motivated, organized, professional attacks
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...
Data-Driven Security: Analysis, Visualization and Dashboards
Uncover hidden patterns of data and respond with countermeasures
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to...
iPad and iPhone Kung Fu: Tips, Tricks, Hints, and Hacks for iOS 7
Printed in full color.
A shortcut straight to power-user level with over 300 tips, tricks, hints, and hacks to make your Apple device the one thing you can't live without. Learn the secrets of FaceTime, Maps, Safari, and Mail. Transform your Apple device into a go-to office tool, as well as tighten security to...
The Definitive Guide to Django: Web Development Done Right, Second Edition This latest edition of The Definitive Guide to Django is updated for Django 1.1, and, with the forward–compatibility guarantee that Django now provides, should serve as the ultimate tutorial and reference for this popular framework for years to come.
Django, the Python–based equivalent to Ruby’s Rails web development...
Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...
Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
Pro HTML5 and CSS3 Design Patterns (Professional Apress)
This is a solutions book for styling HTML5 with CSS3. It contains more than 350 design patterns you can
put to use right away. Each design pattern is modular and customizable, and you can combine patterns
to create an unlimited number of designs.
Each design pattern has been thoroughly tested and proven to work in all major web...
Google Analytics, 3rd Edition
With 2 billion sites on the Web, who's looking at yours?
Google Analytics can tell you. With great new features including advanced customization and segmentation capabilities, Analytics supplies information about your site visitors that helps you ramp up the value of your site. And like its two previous editions, this guide...
Word Hacks : Tips & Tools for Taming Your Text
Few software applications are as ubiquitous as Microsoft Word, which has been around for more than 20 years—practically an eternity in computer time. Even as competitors, such as OpenOffice.org, emerge from the open source community, their success relies heavily on how much they look and act like Word. When most people...
Knoppix Hacks : 100 Industrial-Strength Tips and Tools Knoppix Hacks is an invaluable collection of one hundred industrial-strength hacks for new Linux users, power users, and system administrators using--or considering using--the Knoppix Live CD. These tips and tools show how to use the enormous amount of software on this live CD to troubleshoot, repair, upgrade,...
|Result Page: 21 20 19 18 17 16 15 14 13 12 |