Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
CCNP Security VPN 642-648 Quick Reference
CCNP Security VPN 642-648 Quick Reference

As a final exam preparation tool, the CCNP Security VPN 642-648 Quick Reference ...

grep Pocket Reference
grep Pocket Reference
grep Pocket Reference is the first guide devoted to grep, the powerful utility program that helps you locate content in any file on a Unix or Linux system. Several applications use grep, from mail filtering and system log management to malware analysis and application development, and there are many other ways to use the utility. This pocket...
CCNA Wireless (640-722 IUWNE) Quick Reference
CCNA Wireless (640-722 IUWNE) Quick Reference

As a final exam preparation tool, the CCNA Wireless (640-722 IUWNE) Quick Reference provides a concise review of all objectives on the new exams.  The short eBook provides readers with detailed,...

C++ Plus Data Structures, Third Edition
C++ Plus Data Structures, Third Edition
C++ Plus Data Structures is designed for a course in Data Structures where C++ is the programming language. The book focuses on abstract data types as viewed from three different perspectives: their specification, their application, and their...
You're My Favorite Client
You're My Favorite Client

Whether you're a designer or not, you make design decisions every day. Successful design projects require equal participation from both the client and the design team. Yet, for most people who buy design, the process remains a...

Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond
Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond

"Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking."
—Tom Clark, Director, Technical Marketing, Nishan Systems

The Windows and enterprise storage markets are...

Irresistible Apps: Motivational Design Patterns for Apps, Games, and Web-based Communities
Irresistible Apps: Motivational Design Patterns for Apps, Games, and Web-based Communities

When you create an app, a website, or a game, how do you attract users, and perhaps more importantly, how do you keep them? Irresistible Apps ...

Financial Accounting For Dummies, 2nd Edition
Financial Accounting For Dummies, 2nd Edition

Learn to speak fluent finance—and ace your exams!  

Warren Buffett said that “accounting is the language of business.’’ And for many accounting and business students, the obscure terminology of accounting...

Google Hacking for Penetration Testers
Google Hacking for Penetration Testers
Google Hacking for Penetration Testers explores the explosive growth of a technique known as "Google Hacking." This simple tool can be bent by hackers and those with malicious intents to find hidden information, break into sites, and access supposedly secure information. Borrowing the techniques pioneered by malicious...
Telecommunications and Data Communications Handbook
Telecommunications and Data Communications Handbook
A practical, accessible survey of telecommunications and data communications services and technologies

Finally, there is a commonsense guide to telecommunications and data communications that non-engineers can understand. Popular author Ray Horak provides comprehensive, up-to-date information in plain English, instead of confusing technotalk....

Intrusion Prevention and Active Response : Deploying Network and Host IPS
Intrusion Prevention and Active Response : Deploying Network and Host IPS
From the Foreword by Stephen Northcutt, Director of Training and Certification, The SANS Institute

Within a year of the infamous "Intrusion Detection is Dead" report by Gartner, we started seeing Intrusion Prevention System (IPS) products that actually worked in the real world. Security professionals are going to be...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy