With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...
Everything you need to know to create a dynamic PHP and MySQL Web site!
Been thinking of creating a high-quality interactive Web site? This book is just what you need to get started! Here's the fun and easy way(r) to develop a Web application in PHP 4, 5, or 6 and...
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management...
To help you be more efficient in your work, this handy pocket reference gives you instant reminders on how to use important MySQL functions, especially in conjunction with key parts of the LAMP open source infrastructure. This powerful database system is so rich in features that no administrator or programmer can stay familiar with all of...
Sams Teach Yourself Microsoft Windows® 7 in 10 Minutes gives you straightforward, practical answers when you need fast results. By working through its 10-minute lessons, you’ll learn how to get more done with Windows 7…get it done quicker with no hassle…and have more fun along the way!
This text unifies the concepts of information, codes and cryptography as first studied by Shannon in his seminal papers on communication and secrecy systems. The first five chapters cover the fundamental ideas of information theory, compact encoding of messages and the theory of error-correcting codes. After a discussion of mathematical...
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...
When Linux or Unix gets adopted by computing groups that already have users working with a version of the Windows platform, administrators overseeing the network integration of the two operating systems look to Samba to make a connection. Sams Teach Yourself Samba in 24 Hours furnishes 24 one-hour essential lessons geared toward...
Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.
Is your PHP app truly secure? Let's make sure you get home...