|
|
|
|
|
|
Web Application Vulnerabilities: Detect, Exploit, PreventThis book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,... | | | | |
|
Antenna Toolkit, Second Edition"'It has never been easier to transmit and received radio signals than by using this book, which is aimed at beginners and advanced users alike.' Elektor Electronics"
Joe Carr has provided radio amateurs and short-wave listeners with the definitive design guide for sending and receiving radio signals with Antenna... | | Interfacing PIC Microcontrollers: Embedded Design by Interactive SimulationExplore in detail microcontroller interfacing techniques using the popular PIC 16F877 Work through step-by-step examples interactively using circuit simulation software, supplied as assembly source code Gain the knowledge of a wide range of peripheral devices such as keyboards, displays, sensors and drives and serial communication with... | | IoT Security Issues
IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |