|
|
|
|
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement... | | Steal This Computer Book 3: What They Won't Tell You About the InternetThis offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.
WARNING: This book is not to be used for hacking into government computers, shutting... | | Pro DNS and BINDEvery time you get e-mail, every time you access a web page, you use the Domain Name System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day. Every one of those 2 billion requests originate from a DNS that supports a group of local users, and every one of them is finally answered by a DNS server... |
|
SSH, the Secure Shell: The Definitive GuideAre you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every... | | Buying & Selling Music, Instruments, and Music Collectibles on eBayThis book is about eBay but with a twist. The focus is on buying and selling music-related items on eBay. We found a niche and it’s all about music!
It’s always fun to write about something you love. In this case, I’m truly blessed because I’m writing about two of my favorite things: eBay and music.
So,... | | Hacking Exposed LinuxGNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are... |
|
Practical CakePHP Projects (Practical Projects)If you’ve been using PHP for sometime now and would like to start using a web framework, you’ll want to try CakePHP, which is an open source rapid development web framework built on PHP.
PHP experts Kai Chan and John Omokore guide you through a variety of practical CakePHP applications. You will... | | CompTIA Security+ All-in-One Exam Guide, Second EditionA CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One
Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of... | | Plone 3 Intranets
Plone is widely used for creating feature-rich and secure enterprise intranets. Each company has different goals, architecture, hierarchy, and size and requires a very different intranet to manage its business. No matter what size, or what purpose, Plone offers solutions to the most common intranet needs, and more.
If you've... |
|
|
|
Result Page: 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 |