Windows 8 User’s Manual
393円 If you are like many others who want to stay updated with the latest technologies, and want to adapt the same as soon as it is possible for you, then Windows 8 is for you! However, it is important to know that this version differs a lot from the earlier versions developed by Microsoft. This makes...
The Myths of Security
2,174円 If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for profes...
Hacking and Securing iOS Applications
1,813円 If you’re an app developer with a solid foundation in Objective-C, this book is an absolute mustーchances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applicat...
Cloud Security and Privacy
2,534円 You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep ...
Privacy and Big Data
1,540円 Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data,...
Programming .NET Security
3,617円 With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework....
Angriffsziel UI
470円 Das User Interface, auf dem Benutzeraktionen und -eingaben, beispielsweise zur Authentifizierung auf einer Webseite, getätigt werden, ist ein beliebtes Ziel für Cyberkriminelle, um Zugangsdaten zu erlangen. Das erste Kapitel dieses shortcuts befasst sich mit so genannten Logikfehlern, durch die s...
Snort Cookbook
2,895円 If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to d...
JavaScript Security
470円 Prinzipiell kann jedes Computerprogramm Schwachstellen enthalten. Auch JavaScript- und HTML5-Code stellen hier keine Ausnahme dar. Im ersten Kapitel dieses shortcuts werden XSS und browserbasierte Botnets genauer betrachtet. Kapitel 2 geht auf die Sicherheitssituation von HTML5 ein. Dabei beleuch...
Towards an Extra Layer of Security: Two-F...
80円 The buzz in the web market is two-factor authentication (also known as TFA, 2FA, two-step verification, multi-factor authentication). Many users hold multiple accounts on multiple websites, and most of them use the same password for multiple accounts. If their password is hacked on one website, t...
InduSoft Application Design and SCADA Dep...
200円 InduSoft conducts ongoing product and informational SCADA security webinars, publish Technical Notes and White Papers on application construction and security related topics, and publishes corporate blogs on security and a number of other useful topics by a variety of different authors. Topics fr...
OWASP Top 10
470円 Sicherheit im Web ist ein immerwährendes Thema, dem durch gewisse Vorfälle, wie dem NSA-Skandal, stetig mehr Aufmerksamkeit zuteilwurde. Der größte Teil der Sicherheitslücken ist auf dem Web Application Layer zu verorten. Das Open Web Application Security Project (OWASP) untersucht die dort zu fi...
楽天Koboの電子書籍!マンガ、小説、雑誌のレビュー高評価、最安値をチャック!