 |
|
 HTML5 Enterprise Application Development
For developers who want to build enterprise web applications using HTML5, CSS3, JavaScript, and external XPIs, this tutorial is all you need. Structured around the creation of a real application, it's practical and easily assimilated.
Overview
-
Learn the most useful HTML5 features by developing a...
|  |  The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks
The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security... |  |  |
|
|
 |  |  CEH v9: Certified Ethical Hacker Version 9 Study Guide
The ultimate preparation guide for the unique CEH exam.
The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,... |  |  Linux Server Security: Hack and Defend
Learn how to attack and defend the world’s most popular web server platform
Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server... |
|
 CEH v9: Certified Ethical Hacker Version 9 Practice Tests
Master CEH v9 and identify your weak spots
CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain... |  |  Cell-Penetrating Peptides: Processes and Applications
One of the major problems with drug delivery is the inability of large hydrophilic compounds to pass through the lipid membrane of the cell, thus making drugs such as polypeptides and oligonucleotides of limited therapeutic value. Until recently, the transport of such molecules into the cytoplasmic and nuclear compartments of living cells... |  |  Intermediate Security Testing with Kali Linux 2
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux... |
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |