 |
|
|
 FreeSWITCH 1.6 Cookbook
Over 45 practical recipes to empower you with the latest FreeSWITCH 1.6 features
About This Book
-
Learn how to create a fast and secure messaging and telephony system with FreeSWITCH
-
Trap all the common functionalities of the telephony platform using popular communication protocols
... |  |  Java in a Nutshell, Fourth Edition
Java just keeps growing, adding features, functionality, complexity, and tempting developers to growl with frustration. The new 1.4 release of Java 2 Standard edition increases the size of the platform by 50%, to 2757 classes in 135 packages. How are you going to figure out what this means for your applications? As always, Java in... |  |  Boost.Asio C++ Network Programming
Enhance your skills with practical examples for C++ network programming
Overview
-
Augment your C++ network programming using Boost.Asio
-
Discover how Boost.Asio handles synchronous and asynchronous programming models.
-
Practical examples of client/server applications.
... |
|
 Social Engineering: The Art of Human Hacking
The first book to reveal and dissect the technical aspect of many social engineering maneuvers
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the... |  |  Identity and Data Security for Web Development: Best Practices
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how... |  |  Android Security Cookbook
Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Overview
-
Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |