 |
|
|
 The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context... |  |  Codecharts: Roadmaps and blueprints for object-oriented programs
In this book we set out to investigate some of the most difficult problems that
software engineering faces. Although a young discipline, it nonetheless faces
the most difficult challenges, as software is the most complex artefact ever
crafted by humankind. As such, many of the problems can be traced to
inadequate abstraction.... |  |  Oracle9i Administration and Management
With Oracle8 and Oracle8i, Oracle Corporation began a trend in database modernization
that has culminated in the Oracle9i release. Many consider Oracle9i to actually be
8.2; I would argue that with the multitude of new features, structures, and capabilities,
9i qualifies as a new release.
Oracle’s power... |
|
|
|
Result Page: 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 |