Warning: file_put_contents(cache/omni_3142af053bfc2b5dbd04566d65730eb5.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Network Security
Teaches end-to-end network security concepts and techniques. Includes comprehensive information on how to design a comprehensive security defense model. Plus, discloses how to develop and deploy compu...
View Book →
Optimizing Windows NT
Optimizing™ Windows NT® Maximize Your NT Network Performance Take full advantage of the portability, compatibility, and scalability of Windows NT Identify critical topology issues and network bottl...
View Book →
Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition
Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and...
View Book →
Operations Manager Field Experience
Microsoft System Center...
View Book →Security in Computing and Communications
This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised fu...
View Book →
Java 3D Programming
A Guide to Key Concepts and Effective Techniques...
View Book →
Iron-Clad Java
Proven Methods for Building Secure Java-Based Web Applications Develop, deploy, and maintain secure Java applications using the expert techniques and open source libraries described in this Oracle Pre...
View Book →Information Security: The Complete Reference, Second Edition
Develop and implement an effective end-to-end security program Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT profession...
View Book →
CompTIA PenTest+ Certification Practice Exams (Exam PT0-001)
Don’t Let the Real Test Be Your First Test!Prepare for the challenging PenTest+ exam from CompTIA using this highly effective self-study guide. The book offers accurate practice questions for all ex...
View Book →
Fuzzing
FUZZING Master One of Today's Most Powerful Techniques for Revealing Security Flaws! Fuzzing has evolved into one of today's most effective approaches to test software security. To "fuzz," you attach ...
View Book →Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expan...
View Book →Mastering C# and .NET Framework
Deep dive into C# and .NET architecture to build efficient, powerful applications Key Features [*] Uniquely structured content to help you understand what goes on under the hood of .NET’s managed co...
View Book →Instant Messaging and Cross Site Scripting (XSS)
Seminar paper from the year 2011 in the subject Computer Science - IT-Security, Ruhr-University of Bochum (Netz und Datensicherheit), course: IT Sicherheit, language: English, abstract: Cross-Site Scr...
View Book →
Kubernetes for Full-Stack Developers
...
View Book →
Hands-on Penetration Testing for Web Applications
DESCRIPTION Hands-on Penetration Testing for Web Applications offers readers with the knowledge and skillset to identify, exploit, and control the security vulnerabilities present in commercial web ap...
View Book →24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for w...
View Book →
Hacking Exposed Web Applications, Second Edition
Implement bulletproof e-business security the proven Hacking Exposed way Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully...
View Book →
Web Application Security, A Beginner's Guide
Security Smarts for the Self-Guided IT Professional “Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed ...
View Book →
Observing the Volcano World
Volcano Crisis Communication...
View Book →GCIH GIAC Certified Incident Handler All-in-One Exam Guide
This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler exam Prepare for the challenging GIAC Certified Incident Handler exam using the detailed informat...
View Book →
International Conference on Applications and Techniques in Cyber Security and Intelligence
This book presents the outcomes of the 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence, which focused on all aspects of techniques and applications in c...
View Book →Application Development and Design: Concepts, Methodologies, Tools, and Applications
Advancements in technology have allowed for the creation of new tools and innovations that can improve different aspects of life. These applications can be utilized across different technological plat...
View Book →
Why Knowing What To Do Is Not Enough
A Realistic Perspective on Self-Reliance...
View Book →
The Browser Hacker's Handbook
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to ...
View Book →
Production Ergonomics
Designing Work Systems to Support Optimal Human Performance...
View Book →Cross-Site Scripting Attacks
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect peopl...
View Book →