|
|
|
|
HackNotes(tm) Web Security Pocket ReferenceHackNotes Web Security Portable Reference describes the hacks and vulnerabilities threatening today's Web applications, then provides the defenses necessary to counteract and destroy threats of all manner. Determine whether a vulnerability exists, then attack and overcome application weaknesses through a series of tested and trusted... | | Python Web Development with Django
Using the simple, robust, Python-based Django framework, you can build powerful Web solutions with remarkably few lines of code. In Python Web Development with Django®, three experienced Django and Python developers cover all the techniques, tools, and concepts you need to make the most of Django 1.0, including all the major... | | Applied Security VisualizationAPPLIED SECURITY VISUALIZATION
“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a... |
|
|
Creating Web Pages For DummiesShare photos and video online with friends and family
Take advantage of free tools, find out about Web design, and get interactive
Okay, you've taken that deep breath and are ready to jump into Web page creation. Before you get hopelessly tangled in all the possibilities, dive into this book! You'll start with free and easy tools,... | | Personal Firewalls for Administrators and Remote UsersPersonal firewalls explained—for remote corporate and home users.
In today's work environment, increasing numbers of mobile employees are using PCs, laptops, and handheld devices to connect to corporate servers. That's great for productivity, but it can also pose a security nightmare. Many of these... | | Hack Proofing Linux : A Guide to Open Source SecurityHack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.
First, we show you how to obtain... |
|
Snort CookbookIf you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an... | | Getting Started with ownCloud
Making your data easily accessible on multiple devices is the primary goal of ownCloud. It gives you control of your own data along with the flexibility to set it up the way you want it. Community backup to the project ensures high quality software and gives you the power to modify and create features.
Getting Started with ownCloud... | | Analyzing Rater Agreement: Manifest Variable MethodsAgreement among raters is of great importance in many domains. For example, in medicine, diagnoses are often provided by more than one doctor to make sure the proposed treatment is optimal. In criminal trials, sentencing depends, among other things, on the complete agreement among the jurors. In observational studies, researchers increase... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |