Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

JavaScript Application Cookbook
JavaScript Application Cookbook
Seasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.

The cookbook begins with...

A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
A Unified Framework for Video Summarization, Browsing & Retrieval: with Applications to Consumer and Surveillance Video
Large volumes of video content can only be easily accessed by the use of rapid browsing and retrieval techniques. Constructing a video table of contents (ToC) and video highlights to enable end users to sift through all this data and find what they want, when they want are essential. This reference puts forth a unified framework to integrate these...
Software Engineering for Modern Web Applications: Methodologies and Technologies (Premier Reference Source)
Software Engineering for Modern Web Applications: Methodologies and Technologies (Premier Reference Source)
As modern organizations migrate from older information architectures to new Web-based systems, the discipline of software engineering is changing both in terms of technologies and methodologies. There is a need to examine this new frontier from both a theoretical and pragmatic perspective, and offer not only a survey of new technologies and...
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
Biological and Bioenvironmental Heat and Mass Transfer (Food Science and Technology)
Biological and Bioenvironmental Heat and Mass Transfer (Food Science and Technology)
Providing a solid foundation in, and systematic treatment of, heat and mass transport, Biological and Bioenvironmental Heat and Mass Transfer covers engineering principles of heat and mass transfer. The author discusses biological content, context, and parameter regimes and supplies practical applications for biological and...
Beginning Spatial with SQL Server 2008
Beginning Spatial with SQL Server 2008
Microsoft SQL Server 2008 introduces new geography and geometry spatial datatypes that enable the storage of structured data describing the shape and position of objects in space. This is an interesting and exciting new feature, with many potentially useful applications.

Beginning Spatial with SQL Server 2008 covers everything you need...

Xenobiotics in the Urban Water Cycle: Mass Flows, Environmental Processes, Mitigation and Treatment Strategies (Environmental Pollution)
Xenobiotics in the Urban Water Cycle: Mass Flows, Environmental Processes, Mitigation and Treatment Strategies (Environmental Pollution)

The presence of xenobiotics in the aquatic environment is seen as one of the biggest challenges for a sustainable water future. Thus, there is a need to understand, in an integrated manner, the sources, flow paths, fate and effects of xenobiotics in the urban water cycle.

This book is an authoritative and comprehensive reference source...

TYPO3 Templates
TYPO3 Templates

The template systems in TYPO3 make it one of the most powerful content management systems available today, but they seem too complex for many users. Site developers, who are able to learn how to use them efficiently, can build more extensible sites quicker and more customized for their users.

This book is a step-by-step guide for...

Combinatorial Optimization and Theoretical Computer Science: Interfaces and Perspectives
Combinatorial Optimization and Theoretical Computer Science: Interfaces and Perspectives

The LAMSADE1 was established in 1976 as a research laboratory jointly funded by Paris-Dauphine University and the CNRS (the French National Science Foundation) oriented to decision aiding, mainly in the areas of multiple criteria decision aiding and linear programming.

It very soon aggregated the research activities on computer...

Getting Started with Citrix XenApp 6
Getting Started with Citrix XenApp 6

XenApp 6 is the leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. It reduces resources and costs for application distribution and management. Using Citrix XenApp 6, you can deploy secure...

Managing Oracle Fusion Applications (Oracle Press)
Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole new level. Whether you’re in the IT department, a systems integrator, a business leader, or an end user, Fusion Applications has more of what you need, less of what you don’t, and some of what you didn’t even think possible.
...
unlimited object storage image
Result Page: 577 576 575 574 573 572 571 570 569 568 567 566 565 564 563 562 561 560 559 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy