Welcome![Sign In][Sign Up]
Location:
Search - handbook security

Search list

[Exploit数字证书

Description: 数字证书技术在当前是一个热点问题也是安全方面的一个重要内容,本教程能帮助大家了解和实现数字证书的具体过程.-digital certificate technology is a current hot issue is the security an important element, the handbook can help you understand and digital certificates to the specific process.
Platform: | Size: 13640 | Author: wang | Hits:

[Develop ToolsInformix_Hacker

Description: Database Hackers Handbook (Chapter 10, 11, 12): Hacking Informix 欲了解Informix安全结构的必要参考。-Database Hackers Handbook (Chapter 10, 11, 12) : Hacking Informix For Informix security structures necessary reference.
Platform: | Size: 4409148 | Author: 王宇 | Hits:

[Exploitbeggu_pl

Description: 网络安全英文入门教程,写的不错,通俗易懂专业。-English portal of network security handbook, written in good, accessible professional.
Platform: | Size: 631956 | Author: Kevin | Hits:

[Other resourceThe.Shellcoder.s.Handbook.Discovering.And.Exploiti

Description: Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.-Every day, patches are created to cover up security holes i n software applications and operating systems . But by the time you download a patch, it could be too late. A hacker may have already ta ken advantage of the hole and wreaked havoc on yo ur system. This innovative book will help you st ay one step ahead. It gives you the tools to disco ver vulnerabilities in C-language-based soft ware, exploit the vulnerabilities you find, and prevent new security holes from occurring.
Platform: | Size: 2196067 | Author: 静水 | Hits:

[Software Engineering designing.security.architecture

Description: This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.
Platform: | Size: 1584861 | Author: testsb | Hits:

[Books(The.Web.Application.Hacker__s.Handbook.Finding.and.Exploiting.Security.Flaws,.2ed),.Stuttard,.Pinto

Description: (The.Web.Application.Hacker__s.Handbook.Finding.and.Exploiting.Security.Flaws,.2ed),.Stuttard,.Pinto.
Platform: | Size: 11392944 | Author: 284359635@qq.com | Hits:

[BooksInformix_Hacker

Description: Database Hackers Handbook (Chapter 10, 11, 12): Hacking Informix 欲了解Informix安全结构的必要参考。-Database Hackers Handbook (Chapter 10, 11, 12) : Hacking Informix For Informix security structures necessary reference.
Platform: | Size: 4409344 | Author: 王宇 | Hits:

[OS programbeggu_pl

Description: 网络安全英文入门教程,写的不错,通俗易懂专业。-English portal of network security handbook, written in good, accessible professional.
Platform: | Size: 631808 | Author: Kevin | Hits:

[OtherThe.Shellcoder.s.Handbook.Discovering.And.Exploiti

Description: Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.-Every day, patches are created to cover up security holes i n software applications and operating systems . But by the time you download a patch, it could be too late. A hacker may have already ta ken advantage of the hole and wreaked havoc on yo ur system. This innovative book will help you st ay one step ahead. It gives you the tools to disco ver vulnerabilities in C-language-based soft ware, exploit the vulnerabilities you find, and prevent new security holes from occurring.
Platform: | Size: 2195456 | Author: 静水 | Hits:

[Software Engineeringdesigning.security.architecture

Description: This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.
Platform: | Size: 1585152 | Author: eioruqoiu | Hits:

[Otherlinuxsecurity

Description: linux security handbook
Platform: | Size: 3841024 | Author: mandar | Hits:

[Windows DevelopThe_Shellcoders_Handbook[2Ed]

Description: The Shellcoder’s Handbook -- Discovering and Exploiting Security Holes Second Edition
Platform: | Size: 3265536 | Author: 李明 | Hits:

[BooksHandbook[1].of.Database.Security.0387485325

Description: this is a book for data base security
Platform: | Size: 4950016 | Author: ahmad | Hits:

[matlabThe.Web.Application.Hackers.Handbook

Description: 黑客技术宝典:web实战篇 网络安全领域经典著作-network security articles
Platform: | Size: 5019648 | Author: yishuihan | Hits:

[OtherWiley.The.Web.Application.Hackers.Handbook.Oct.20

Description: This book is a practical guide to discovering and exploiting security flaws in web applications. By “web application” we mean an application that is accessed by using a web browser to communicate with a web server
Platform: | Size: 5256192 | Author: yanti | Hits:

[CSharpCSharp-data-security-manual-

Description: C#数据安全手册PDF书籍,对.net中通信数据安全的技术讲解详尽-C# Data Security Handbook PDF books on. Net in communications technology to explain the detailed data security
Platform: | Size: 14110720 | Author: maweiqi | Hits:

[OtherThe-Database-Hackers-Handbook

Description: Written by four of the world s top security how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage of database hackers
Platform: | Size: 1168384 | Author: CJ | Hits:

[VC/MFCThe-Shellcoders-Handbook

Description: provides tools to discover vulnerabilities in C-language-based software, exploit what you find, and prevent new security holes from occurring.
Platform: | Size: 2191360 | Author: CJ | Hits:

[OtherHandbook-of-Applied-Cryptography

Description: 信息安全 handbook of applied of cryptography-information security book handbook of applied cryptography
Platform: | Size: 5590016 | Author: yangxue | Hits:

[OtherHTTP-Handbook

Description: HTTP是协议的权力网络。随着Web应用程序变得越来越复杂,而作为新兴技术继续大量依赖HTTP,了解该协议正变得越来越必不可少的专业Web开发人员。通过学习HTTP协议,Web开发人员获得的Web架构更深入的了解,并能创造更好的Web应用程序更可靠,更快捷,更安全。 在HTTP开发手册是为Web开发人员专门编写。它首先通过引入协议,并解释它以直观的方式。然后,它演示了如何利用这些信息来改善应用程序。广泛的信息和例子给出涵盖了各种各样的问题,比如状态和会话管理,缓存,SSL,软件架构和应用程序的安全性。-HTTP is the protocol that powers the Web. As Web applications become more sophisticated, and as emerging technologies continue to rely heavily on HTTP, understanding this protocol is becoming more and more essential for professional Web developers. By learning HTTP protocol, Web developers gain a deeper understanding of the Web s architecture and can create even better Web applications that are more reliable, faster, and more secure. The HTTP Developer s Handbook is written specifically for Web developers. It begins by introducing the protocol and explaining it in a straightforward manner. It then illustrates how to leverage this information to improve applications. Extensive information and examples are given covering a wide variety of issues, such as state and session management, caching, SSL, software architecture, and application security.
Platform: | Size: 1743872 | Author: qmitw | Hits:
« 12 »

CodeBus www.codebus.net