 |
|
|
 Professional Pen Testing for Web Applications (Programmer to Programmer)There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical... |  |  Developing More-Secure Microsoft ASP.NET 2.0 Applications (Pro Developer)Get hands-on, expert guidance for developing more secure Web applications with ASP.NET 2.0 with this in-depth reference. The nature of the Web and its underlying communication protocols make Web applications harder to secure and, therefore, primary targets for hacking attacks and other kinds of compromises. This book guides you through the possible... |  |  Hacking For Dummies (Computer/Tech)Welcome to Hacking For Dummies, 2nd Edition. This book outlines — in plain English — computer hacker tricks and techniques that you can use to assess the security of your own information systems, find security vulnerabilities, and fix the weaknesses before criminal hackers and rogue insiders have an opportunity to take advantage of... |
|
 Ajax SecurityThe Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities
More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this... |  |  Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... |  |  Perl Scripting for IT SecurityThis book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it is helpful in fully and more completely... |
|
 Gray Hat Hacking, Second EditionUncover, plug, and ethically disclose security flaws
Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out... |  |  CCENT Exam Cram (exam 640-822)This book includes a CD-ROM that features:
- Complete coverage of CCENT exam objectives
- Realistic exam questions for effective practice
- Detailed explanations of correct and incorrect answers
- Multiple exam modes
- Flash Card format
- An electronic copy of the book
... |  |  Microsoft® Exchange Server 2007 Administrator's CompanionGet your mission-critical messaging and collaboration systemsup and running with the essential guide to deploying and managing ExchangeServer 2007. This comprehensive administrator's reference covers the fullrange of server and client deployments, unified communications, messagingsecurity, performance optimization, troubleshooting, and disaster... |
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 |