Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement...

Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Pro DNS and BIND
Pro DNS and BIND
Every time you get e-mail, every time you access a web page, you use the Domain Name
System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day.
Every one of those 2 billion requests originate from a DNS that supports a group of local users,
and every one of them is finally answered by a DNS server
...
SSH, the Secure Shell: The Definitive Guide
SSH, the Secure Shell: The Definitive Guide
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every...
Buying & Selling Music, Instruments, and Music Collectibles on eBay
Buying & Selling Music, Instruments, and Music Collectibles on eBay
This book is about eBay but with a twist. The focus is on buying and selling music-related items on eBay. We found a niche and it’s all about music!

It’s always fun to write about something you love. In this case, I’m truly blessed because I’m writing about two of my favorite things: eBay and music.

So,
...
Hacking Exposed Linux
Hacking Exposed Linux
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are...
Practical CakePHP Projects (Practical Projects)
Practical CakePHP Projects (Practical Projects)
If you’ve been using PHP for sometime now and would like to start using a web framework, you’ll want to try CakePHP, which is an open source rapid development web framework built on PHP.

PHP experts Kai Chan and John Omokore guide you through a variety of practical CakePHP applications. You will...

CompTIA Security+ All-in-One Exam Guide, Second Edition
CompTIA Security+ All-in-One Exam Guide, Second Edition

A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of...

Plone 3 Intranets
Plone 3 Intranets

Plone is widely used for creating feature-rich and secure enterprise intranets. Each company has different goals, architecture, hierarchy, and size and requires a very different intranet to manage its business. No matter what size, or what purpose, Plone offers solutions to the most common intranet needs, and more.

If you've...

Software Development and Professional Practice
Software Development and Professional Practice

What’s this book all about? Well, it’s about how to develop software, from a personal perspective. We’ll look at what it means for you to take a problem and produce a program to solve it from beginning to end. That said, this book focuses a lot on design. How do you design software? What things do you take into...

Mastering Microsoft Office 2003 for Business Professionals
Mastering Microsoft Office 2003 for Business Professionals

Written for business-minded and experienced Office users, this task-oriented guide goes directly to the bottom line, revealing optimal ways to perform critical, challenging tasks. After fifteen years of teaching people how to be more productive with Office, Courter and Marquis know users’ FAQs and understand the way you use...

MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)

The MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network Study Guide (Exam 70-214) is a one-of-a-kind integration text and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft Exam 70-214 objectives.

  • Completely Guaranteed Coverage of All...
unlimited object storage image
Result Page: 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy