Home | Amazing | Today | Tags | Publishers | Years | Search 
Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), Fourth Edition
CWNA Certified Wireless Network Administrator Official Study Guide (Exam PW0-100), Fourth Edition

This book focuses on the objectives for the CWNA exam, but it's also a useful learning tool for anyone wanting to master the many domains of wireless. You’ll learn about wireless technology basics such as radio frequency—based communications, and you’ll learn about specific standards and protocols that ...

Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
The 18th Tyrrhenian Workshop on digital communications is devoted to wireless communications. In the last decade, wireless communications research boosted launching new standards and proposing new techniques for the access technology. We moved from the UTRA standard capable to transmit 0.5 bit/s/Hz to WLAN which is promising 2.7 bit/s/Hz. Now...
Mobile Multimedia Communications: Concepts, Applications, and Challenges (Premier Reference Source)
Mobile Multimedia Communications: Concepts, Applications, and Challenges (Premier Reference Source)
Mobile multimedia communication is increasingly in demand because of the basic need to communicate at any time, anywhere, using any technology. In addition, to voice communication, people have a desire to access a range of other services that comprise multimedia elements—text, image, animation, high fidelity audio and video using mobile...
Handbook of Biometrics
Handbook of Biometrics
Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of...
Oracle Application Server Portal Handbook (Osborne Oracle Press)
Oracle Application Server Portal Handbook (Osborne Oracle Press)
Wasn’t the Web supposed to make everything easier? Oh sure, the maturation of companies doing business on the Web has made things more reliable and more secure, but easier? If you’ve been using the Web for a while (5+ years), you’ve noticed the evolution from static web pages to dynamic content. AJAX and other technologies provide...
Distributed Services with OpenAFS: for Enterprise and Education
Distributed Services with OpenAFS: for Enterprise and Education
This book shows in detail how to build enterprise-level secure,redundant, and highly scalable services from scratch on top of theopen source Linux operating system, suitable for small companies aswell as big universities. The core architecture presented is based onKerberos, LDAP, AFS, and Samba. It is shown how to integrate web,message related,...
UNIX: The Complete Reference, Second Edition
UNIX: The Complete Reference, Second Edition

Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second...

MCAD/MCSD Self-Paced Training Kit: Implementing Security for Applications with Microsoft  Visual Basic  .NET and Microsoft Visual C#  .NET
MCAD/MCSD Self-Paced Training Kit: Implementing Security for Applications with Microsoft Visual Basic .NET and Microsoft Visual C# .NET
Welcome to MCAD/MCSD Self-Paced Training Kit: Implementing Security for Applications with Microsoft Visual Basic .NET and Microsoft Visual C# .NET.

Developers have learned an important lesson in the last few years: they cannot rely on networks and operating systems to protect applications from attack. Any application, including both Web
...
Developing Ambient Intelligence: Proceedings of the First International Conference on Ambient Intelligence Developments
Developing Ambient Intelligence: Proceedings of the First International Conference on Ambient Intelligence Developments
As Ambient Intelligence (AmI) ecosystems are rapidly becoming a reality, they raise new research challenges. Unlike predefined static architectures as we know them today, AmI ecosystems are bound to contain a large number of heterogeneous computing, communication infrastructures and devices that will be dynamically assembled. Architectures will be...
Beginning Fedora: From Novice to Professional
Beginning Fedora: From Novice to Professional
Linux has come a long way in a short time. Computing itself is still relatively young by any standard; if the era of modern computing started with the invention of the microchip, it’s still less than 50 years old. But Linux is a youngster compared even to this; it has been around for only 16 of those years.

In that brief time span,
...
Beginning Ubuntu Linux, Second Edition (Beginning from Novice to Professional)
Beginning Ubuntu Linux, Second Edition (Beginning from Novice to Professional)
Linux has come a long way in a short time. Computing itself is still relatively young by any standard; if the era of modern computing started with the invention of the microchip, it’s still less than 50 years old. But Linux is a youngster compared even to this; it has been around for only 16 of those years.

In that brief time span,
...
Result Page: 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy