Secure Coding in C and C++
"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...
Learning Perforce SCM
A comprehensive guide to the world's leading enterprise configuration management system
Master the use of P4V - the Perforce Visual Client
Get into the Perforce mindset for seamless use in your daily work
Grasp key concepts and learn how to apply them for proper...
Penetration Testing with Perl
Harness the power of Perl to perform professional penetration testing
About This Book
Write your own custom information security tools using Perl and object-oriented Perl modules
Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
|Result Page: 11 10 9 8 7 6 5 4 3 2 |