Moozonian
Web Images Developer News Books Maps Shopping Moo-AI
Showing results for <script>alert('XSS')</script>

Warning: file_put_contents(cache/omni_3142af053bfc2b5dbd04566d65730eb5.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Cover of Network Security
Google Books

Network Security

By BRAGG

Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy compu...

View Book →
Cover of Xamarin.Forms Notes for Professionals
dBooks

Xamarin.Forms Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of Optimizing Windows NT
Google Books

Optimizing Windows NT

By Sean K. Daily

Optimizing™ Windows NT® Maximize Your NT Network Performance Take full advantage of the portability, compatibility, and scalability of Windows NT Identify critical topology issues and network bottl...

View Book →
Cover of Android Notes for Professionals
dBooks

Android Notes for Professionals

By Stack Overflow Community

...

View Book →
Cover of jQuery Succinctly
dBooks

jQuery Succinctly

By Cody Lindley

...

View Book →
Cover of Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
Google Books

Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition

By Daniel Regalado, Shon Harris, Allen Harper, Chris Eagle, Jon

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and...

View Book →
Cover of Operations Manager Field Experience
dBooks

Operations Manager Field Experience

By Danny Hermans, Uwe Stürtz, Mihai Sarbulescu, Mitch Tulloch

Microsoft System Center...

View Book →
Cover of Security in Computing and Communications
Google Books

Security in Computing and Communications

By Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat,

This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised fu...

View Book →
Cover of Java 3D Programming
dBooks

Java 3D Programming

By Daniel Selman

A Guide to Key Concepts and Effective Techniques...

View Book →
Cover of Learning Twitter Bootstrap
dBooks

Learning Twitter Bootstrap

By Stack Overflow Community

...

View Book →
Cover of Iron-Clad Java
Google Books

Iron-Clad Java

By Jim Manico, August Detlefsen

Proven Methods for Building Secure Java-Based Web Applications Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Pre...

View Book →
Cover of Information Security: The Complete Reference, Second Edition
Google Books

Information Security: The Complete Reference, Second Edition

By Mark Rhodes-Ousley

Develop and implement an effective end-to-end security program Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT profession...

View Book →
Cover of Learning Bosun
dBooks

Learning Bosun

By Stack Overflow Community

...

View Book →
Cover of CompTIA PenTest+ Certification Practice Exams (Exam PT0-001)
Google Books

CompTIA PenTest+ Certification Practice Exams (Exam PT0-001)

By Jonathan Ammerman

Don’t Let the Real Test Be Your First Test!Prepare for the challenging PenTest+ exam from CompTIA using this highly effective self-study guide. The book offers accurate practice questions for all ex...

View Book →
Cover of Flutter Succinctly
dBooks

Flutter Succinctly

By Ed Freitas

...

View Book →
Cover of Fuzzing
Google Books

Fuzzing

By Michael Sutton, Adam Greene, Pedram Amini

FUZZING Master One of Today's Most Powerful Techniques for Revealing Security Flaws! Fuzzing has evolved into one of today's most effective approaches to test software security. To "fuzz," you attach ...

View Book →
Cover of Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
Google Books

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

By Allen Harper, Shon Harris, Jonathan Ness, Chris Eagle, Gideo

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expan...

View Book →
Cover of Mastering C# and .NET Framework
Google Books

Mastering C# and .NET Framework

By Marino Posadas

Deep dive into C# and .NET architecture to build efficient, powerful applications Key Features [*] Uniquely structured content to help you understand what goes on under the hood of .NET’s managed co...

View Book →
Cover of Instant Messaging and Cross Site Scripting (XSS)
Google Books

Instant Messaging and Cross Site Scripting (XSS)

By Katharina Kurek

Seminar paper from the year 2011 in the subject Computer Science - IT-Security, Ruhr-University of Bochum (Netz und Datensicherheit), course: IT Sicherheit, language: English, abstract: Cross-Site Scr...

View Book →
Cover of Kubernetes for Full-Stack Developers
dBooks

Kubernetes for Full-Stack Developers

By Jamon Camisso, Hanif Jetha, Katherine Juell

...

View Book →
Cover of The Svelte Handbook
dBooks

The Svelte Handbook

By Flavio Copes

...

View Book →
Cover of Hands-on Penetration Testing for Web Applications
Google Books

Hands-on Penetration Testing for Web Applications

By Richa Gupta

DESCRIPTION Hands-on Penetration Testing for Web Applications offers readers with the knowledge and skillset to identify, exploit, and control the security vulnerabilities present in commercial web ap...

View Book →
Cover of 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
Google Books

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

By Michael Howard, David LeBlanc, John Viega

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for w...

View Book →
Cover of Svelte Succinctly
dBooks

Svelte Succinctly

By Ed Freitas

...

View Book →
Cover of Hacking Exposed Web Applications, Second Edition
Google Books

Hacking Exposed Web Applications, Second Edition

By Joel Scambray, Mike Shema, Caleb Sima

Implement bulletproof e-business security the proven Hacking Exposed way Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully...

View Book →
Cover of Web Application Security, A Beginner's Guide
Google Books

Web Application Security, A Beginner's Guide

By Bryan Sullivan, Vincent Liu

Security Smarts for the Self-Guided IT Professional “Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed ...

View Book →
Cover of Observing the Volcano World
dBooks

Observing the Volcano World

By Carina Fearnley, Deanne Bird, Katharine Haynes, William McGu

Volcano Crisis Communication...

View Book →
Cover of GCIH GIAC Certified Incident Handler All-in-One Exam Guide
Google Books

GCIH GIAC Certified Incident Handler All-in-One Exam Guide

By Nick Mitropoulos

This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler exam Prepare for the challenging GIAC Certified Incident Handler exam using the detailed informat...

View Book →
Cover of The Vue.js Handbook
dBooks

The Vue.js Handbook

By Flavio Copes

...

View Book →
Cover of How To Code in React.js
dBooks

How To Code in React.js

By Joe Morgan

...

View Book →
Cover of International Conference on Applications and Techniques in Cyber Security and Intelligence
Google Books

International Conference on Applications and Techniques in Cyber Security and Intelligence

By Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam

This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in c...

View Book →
Cover of Application Development and Design: Concepts, Methodologies, Tools, and Applications
Google Books

Application Development and Design: Concepts, Methodologies, Tools, and Applications

By Management Association, Information Resources

Advancements in technology have allowed for the creation of new tools and innovations that can improve different aspects of life. These applications can be utilized across different technological plat...

View Book →
Cover of Why Knowing What To Do Is Not Enough
dBooks

Why Knowing What To Do Is Not Enough

By Anne-Greet Keizer, Will Tiemeijer, Mark Bovens

A Realistic Perspective on Self-Reliance...

View Book →
Cover of The Browser Hacker's Handbook
Google Books

The Browser Hacker's Handbook

By Wade Alcorn, Christian Frichot, Michele Orru

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to ...

View Book →
Cover of Production Ergonomics
dBooks

Production Ergonomics

By Cecilia Berlin, Caroline Adams

Designing Work Systems to Support Optimal Human Performance...

View Book →
Cover of Cross-Site Scripting Attacks
Google Books

Cross-Site Scripting Attacks

By B. B. Gupta, Pooja Chaudhary

Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect peopl...

View Book →