-
Web Penetration Testing with Kali Linux - Third Edition
Author Juned Ahmed Ansari , Gilberto Najera-Gutierrez
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holesAbout This BookKnow how to set up your lab with Kali LinuxDiscover the core concepts of web penetration testin....
Release Date 2018/02 -
Web Penetration Testing with Kali Linux - Second Edition
Author Juned Ahmed Ansari
Build your defense against web attacks with Kali Linux 2.0About This BookGain a deep understanding of the flaws in web applications and exploit them in a practical mannerGet hands-on web application hacking experience with a range of tools in Kali Linux 2.0Develop ....
Release Date 2015/11 -
Web Penetration Testing with Kali Linux
Author Aamir Lakhani , Joseph Muniz
Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit.Learn key reconnaissance concepts needed as a penetrati....
Release Date 2013/09 -
Web Hacking: Attacks and Defense
Author Shreeraj Shah , Saumil Shah , Stuart McClure
"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, paymen....
Release Date 2002/08 -
Author Andrew Hoffman
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking—until now. This practical guide provides both defensive and offensive security concepts that software engineers can easily ....
Release Date 2020/06 -
Author Vincent Liu , Bryan Sullivan
Security Smarts for the Self-Guided IT ProfessionalSecure web application from today's most devious hackers. Web Application Security: A Beginner's Guide helps you stock your security toolkit, prevent common hacks, and defend quickly against malicious attacks.This....
Release Date 2011/11 -
Author Chad Russell
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security....
Release Date 2018/04 -
Web Application Defender's Cookbook
Author Jeremiah Grossman , Ryan C. Barnett
Defending your web applications against hackers and attackersThe top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect c....
Release Date 2012/12 -
Web Accessibility: Web Standards and Regulatory Compliance
Author Andrew Kirkpatrick , Patrick H. Lauke , Jim Thatcher , Shawn Lawton Henry , Cynthia
The power of the Web lies in the fact that anyone and everyone can access it, and this should also extend to users with disabilities. Accessibility is about making websites accessible to those with aural, visual, or physical disabilities, or rather, constructing web....
Release Date 2006/07 -
Web 2.0: Principles and Best Practices
Author John Musser
Web 2.0 Principles and Best Practices
Release Date 2006/11 -
Web 2.0 Mash-ups and the New Aggregators
Author Martin Kelley
Web aggregators select and present content culled from multiple sources, playing an important taste-making and promotional role. Larger aggregators are starting to compete with mainstream news sources but a new class of niche and do-it-yourself aggregators are orga....
Release Date 2008/04 -
Author Duane Nickull , Dion Hinchcliffe , James Governor
Web 2.0 is more pervasive than ever, with business analysts and technologists struggling to comprehend the opportunity it represents. So what exactly is Web 2.0 -- a marketing term or technical reality? This fascinating book finally puts substance behind the phenome....
Release Date 2009/05 -
Author Geoff Walton , Dave Parkes
In a world where computing power, ubiquity and connectivity create powerful new ways to facilitate learning, this book examines how librarians and information professionals can utilize emerging technologies to expand service and resource delivery. With contributions....
Release Date 2010/04 -
Wealth: Grow It, Protect It, Spend It, and Share It
Author Stuart E. Lucas
Never has it been more important to read Wealth: Grow It, Protect It, Spend It, and Share It. More of us have created more wealth today than ever before; managing our retirement assets is increasingly our own responsibility; and America is bracing for the largest ....
Release Date 2006/02 -
Warding Off the Threat of Disruption
Author Joshua S. Gans , Daniel Cohen
In a fast-changing digital landscape, companies shouldn't wait too long to reconfigure their offerings — but they also should be wary of moving to an untested technology too soon. Monitoring trends in related industries and identifying high-potential startup....
Release Date 2016/01 -
Waging Cyber War: Technical Challenges and Operational Constraints
Author Jacob G. Oakley
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard....
Release Date 2019/08 -
Author Park Foreman
As old as the threat of danger itself, vulnerability management (VM) has been the responsibility of leaders in every human organization, from tribes and fiefdoms right up through modern multinationals. Today, the focus of vulnerability management is still on infras....
Release Date 2009/08 -
Author Valeria Sokal , Alvaro Sala , Rama Ayyar , Dave Lovelace
Virtual Storage Access Method (VSAM) is one of the access methods used to process data. Many of us have used VSAM and work with VSAM data sets daily, but exactly how it works and why we use it instead of another access method is a mystery. This book helps to demy....
Release Date 2003/09 -
Visual Media Coding and Transmission
Author Ahmet Kondoz
This book presents the state-of-the-art in visual media coding and transmissionVisual Media Coding and Transmission is an output of VISNET II NoE, which is an EC IST-FP6 collaborative research project by twelve esteemed institutions from across Europe in the fields ....
Release Date 2010/04 -
Visual Cryptography and Secret Image Sharing
Author Ching-Nung Yang , Stelvio Cimato
With rapid progress in Internet and digital imaging technology, there are more and more ways to easily create, publish, and distribute images. Considered the first book to focus on the relationship between digital imaging and privacy protection, Visual Cryptography ....
Release Date 2017/12 -
Author Chris C. Ducker
Entrepreneurs often suffer from superhero syndromethe misconception that to be successful, they must do everything themselves. Not only are they the boss, but also the salesperson, HR manager, copywriter, operations manager, online marketing guru, and so much more. ....
Release Date 2014/04 -
Video Systems in an IT Environment
Author Al Kovalick
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes te....
Release Date 2005/12 -
VHF / UHF Filters and Multicouplers: Application of Air Resonators
Author Bernard Piette
This book describes the various devices used in radio communication and broadcasting to achieve high selectivity filtering and coupling. After providing a background in the basics of microwave theory and more detailed material - including a special chapter on precis....
Release Date 2010/02 -
Version Control with Subversion, 2nd Edition
Author Brian W. Fitzpatrick , Ben Collins-Sussman , C. Michael Pilato
Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.5 with a complete introduction and guided tour of its c....
Release Date 2008/09 -
Verification of Systems and Circuits Using LOTOS, Petri Nets, and CCS
Author Rakefet Kol , Michael Yoeli
A Step-by-Step Guide to Verification of Digital SystemsThis practical book provides a step-by-step, interactive introduction to formal verification of systems and circuits. The book offers theoretical background and introduces the application of three powerful verif....
Release Date 2008/03 -
Author Behrooz Mashadi , David Crolla
The powertrain is at the heart of vehicle design; the engine – whether it is a conventional, hybrid or electric design – provides the motive power, which is then managed and controlled through the transmission and final drive components. The overall powertra....
Release Date 2012/01 -
VCP5-DT Official Cert Guide: VMware Certified Professional 5 - Desktop
Author Linus Bourque
The Publisher regrets that the companion CD/DVD content cannot be made available Online.The VCP5-DT Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" quizze....
Release Date 2013/08 -
VCP-Cloud Official Cert Guide (with DVD): VMware Certified Professional - Cloud
Author Tom Ralph , Nathan Raper
The Publisher regrets that the CD/DVD content for this title cannot be made available Online.VCP-Cloud Official Cert Guide presents you with an organized test-preparation routine through the use of proven series elements and techniques. "Do I Know This Already?" qui....
Release Date 2013/10 -
VCAP5-DCD Official Cert Guide: VMware Certified Advanced Professional 5-Data Center Design
Author Paul McSharry
The Publisher regrets that the companion CD/DVD content for this title cannot be made available Online.The VCAP5-DCD Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This....
Release Date 2013/08 -
Variance-Constrained Multi-Objective Stochastic Control and Filtering
Author Yuming Bo , Zidong Wang , Lifeng Ma
Unifies existing and emerging concepts concerning multi-objective control and stochastic control with engineering-oriented phenomenaEstablishes a unified theoretical framework for control and filtering problems for a class of discrete-time nonlinear stochastic syst....
Release Date 2015/06