Websecurity
470円 Stetig gibt es neue SSRF- und CSRF-Angriffe; einige sind gefährlicher als anfänglich vermutet. Dieser shortcut erklärt und untersucht SSRF- sowie CSRF-Schwachstellen und zeigt Ihnen, mit welchen Mitteln Sie diesen entgegentreten können. XML ist schon bei der SSRF nicht unbeteiligt; ebenso spielt ...
Sharing Big Data Safely
1,989円 Many big data-driven companies today are moving to protect certain types of data against intrusion, leaks, or unauthorized eyes. But how do you lock down data while granting access to people who need to see it? In this practical book, authors Ted Dunning and Ellen Friedman offer two novel and pra...
Essential Skills for Hackers
4,225円 Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, t...
Mastering OAuth 2.0
5,638円 Create powerful applications to interact with popular service providers such as Facebook, Google, Twitter, and more by leveraging the OAuth 2.0 Authorization Framework About This Book • Learn how to use the OAuth 2.0 protocol to interact with the world's most popular service providers, such as Fa...
Cybercrime in Progress
12,767円 The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways. Criminological scholarship on these issues has increased dramatically over the last decade, as have studies on ways to prevent and poli...
Breaking into Information Security
4,225円 Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what y...
Google Hacking for Penetration Testers
6,339円 Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified d...
Security Controls Evaluation, Testing, an...
7,925円 Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security...
Digital Forensics
5,282円 Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practiti...
Building a Home Security System with Rasp...
4,227円 Build your own sophisticated modular home security system using the popular Raspberry Pi board About This Book • This book guides you through building a complete home security system with Raspberry Pi and helps you remotely access it from a mobile device over the Internet • It covers the fundamen...
Trustworthy Global Computing
6,076円 This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Symposium on Trustworthy Global Computing, TGC 2013, held in Buenos Aires, Argentina, in August 2013. The 15 revised full papers presented together with 3 invited talks were carefully reviewed and s...
Ad Hoc Networks
5,591円 This book constitutes the thoroughly refereed proceedings of the 5th International Conference on Ad Hoc Networks, ADHOCNETS 2013, held in Barcelona, Spain, in October 2013. The 14 revised full papers presented were carefully selected and reviewed from numerous submissions and cover a wide range o...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!