Architecting Secure Software Systems Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they... Learning Scrapy
Extract data from any source to perform real time analytics.
Full of techniques and examples to help you crawl websites and extract data within hours.
A hands-on guide to web scraping and crawling with real-life problems and solutions
|Result Page: 190 189 188 187 186 185 184 183 182 181 |