|
|
|
|
| | Modern Cryptography: Theory and PracticeLeading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents... | | SSL & TLS Essentials: Securing the WebThe Secure Sockets Layer (SSL) and Transport Layer Security(TLS) protocols form the foundation for e-commerce security on the World Wide Web, verifying the authenticity of Web sites, encrypting the transfer of sensitive data, and ensuring the integrity of information exchanged. Now—for the first time the details of these critical security... |
|
Social Engineering: The Art of Human Hacking
The first book to reveal and dissect the technical aspect of many social engineering maneuvers
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the... | | PhoneGap for Enterprise
Master the art of building secure enterprise mobile applications using PhoneGap
About This Book
-
Learn how to build secure mobile enterprise apps from scratch using PhoneGap
-
Understand PhoneGap's framework, including common issues and their resolutions, and become the go-to person in...
| | Multitool Linux: Practical Uses for Open Source SoftwareThis resource-packed guide delivers pragmatic solutions for real-world Linux development needs—all using open-source software tools. Viewing Linux as a well-stocked toolbox, Multitool Linux shows programmers and sophisticated users how to create a wide variety of exciting and useful applications for business and... |
|
|
| | | | Red Hat Linux 9 Professional SecretsThis ultimate under-the-hood guide to Red Hat Linux 9 takes the reader beyond obvious information about this complicated OS, revealing hidden features, tricks and alternate methods not easily found elsewhere.
It takes an expert to unlock the deepest secrets of Red Hat Linux 9–to show you what’s really under the hood and how... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |