 |
|
|
 Securing PHP Apps
Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.
Is your PHP app truly secure? Let's make sure you get home... |  |  Penetration Testing Bootcamp
Key Features
-
Get practical demonstrations with in-depth explanations of complex security-related problems
-
Familiarize yourself with the most common web vulnerabilities
-
Get step-by-step guidance on managing testing results and reporting
Book Description
... |  |  Codes and Cryptography
This text unifies the concepts of information, codes and cryptography as first studied by Shannon in his seminal papers on communication and secrecy systems. The first five chapters cover the fundamental ideas of information theory, compact encoding of messages and the theory of error-correcting codes. After a discussion of mathematical... |
|
 Web Application Development with Yii 2 and PHP
Fast-track your web application development using the new generation Yii PHP framework
About This Book
-
Implement real-world web application features efficiently using the Yii development framework
-
Each chapter provides micro-examples that build upon each other to create the final...
|  |  Understanding Network Hacks: Attack and Defense with Python
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore... |  |  Instant PHP Web Scraping
Get up and running with the basic techniques of web scraping using PHP
Overview
-
Learn something new in an Instant! A short, fast, focused guide delivering immediate results
-
Build a re-usable scraping class to expand on for future projects
-
Scrape, parse, and save data from any...
|
|
 Basic Security Testing with Kali Linux
With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their... |  |  Python Hacking Essentials
Target Audience
-
This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I
... |  |  Windows 8 and Office 2013 For Dummies
Learn to:
-
Navigate the Windows 8 Start screen
-
Create user accounts and set passwords
-
Use Word, Excel®, PowerPoint®, and Outlook®
Master the basics of
Windows 8 and Office 2013!
Windows and Office work together to turn your PC into a... |
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |