Listing 1 - 4 of 4 |
Sort by
|
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
Computer security --- Computer networks --- Web sites --- Ubiquitous computing --- Sécurité informatique --- Réseaux d'ordinateurs --- Sites Web --- Informatique omniprésente --- Congresses --- Security measures --- Congrès --- Sécurité --- Mesures --- Computer networks -- Security measures -- Congresses. --- Computer security -- Congresses. --- Ubiquitous computing -- Congresses. --- Web sites -- Security measures -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Pages, Web --- Sites, Web --- Web pages --- Websites --- World Wide Web pages --- World Wide Web sites --- WWW pages --- WWW sites --- Computer science. --- Computer security. --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Systems and Data Security. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Computer network resources --- Cryptology.
Choose an application
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this
Application software - Security measures. --- Computer crimes - Prevention. --- Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer networks. --- Computer security. --- Web site development - Security measures. --- Web sites -- Security measures. --- Computer networks --- Web site development --- Application software --- Computer security --- Computer crimes --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Prevention --- Security measures. --- Prevention. --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Development of Web sites --- Web sites --- Computer network security --- Network security, Computer --- Security of computer networks --- Development --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer software --- Internet programming --- 004.5 --- apps --- hacken --- Mens-computer interactie. Mens-machine interface. User interface. Gebruikersomgeving
Choose an application
Computer networks --- Web sites --- World Wide Web (Information retrieval system) --- Réseaux d'ordinateurs --- Sites Web --- World Wide Web --- Security measures --- Sécurité --- Mesures --- Sûreté --- Electronic commerce --- 621.391 --- -Electronic commerce --- -Web sites --- -World Wide Web --- -cryptografie --- databeveiliging (informatiebeveiliging) --- firewall --- internet --- java --- javascript --- -005.8 --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Commerce --- Information superhighway --- Pages, Web --- Sites, Web --- Web pages --- Websites --- World Wide Web pages --- World Wide Web sites --- WWW pages --- WWW sites --- Computer network resources --- W3 (World Wide Web) --- Web (World Wide Web) --- WWW (World Wide Web) --- Hypertext systems --- Multimedia systems --- Internet --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- General questions of electrical communication engineering. Cybernetics. Information theory. Signal theory --- Distributed processing --- Security measures. --- 621.391 General questions of electrical communication engineering. Cybernetics. Information theory. Signal theory --- Réseaux d'ordinateurs --- Sécurité --- Sûreté --- 005.8 --- cryptografie --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Computer networks - Security measures --- World Wide Web - Security measures --- Web sites - Security measures --- Electronic commerce - Security measures
Choose an application
Provides information on securing PHP applications, covering such topics as SQL injection, XSS, remote execution, temporary files, REST services, CAPTCHAs, identity verification, and versioning.
Computer networks -- Security measures. --- Internet software. --- PHP (Computer language). --- PHP (Computer program language) -- Handbooks, manuals, etc. --- Web site development -- Security measures -- Handbooks, manuals, etc. --- Web sites -- Security measures -- Handbooks, manuals, etc. --- PHP (Computer program language) --- Web site development --- Web sites --- Engineering & Applied Sciences --- Computer Science --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- General and Others --- Pages, Web --- Sites, Web --- Web pages --- Websites --- World Wide Web pages --- World Wide Web sites --- WWW pages --- WWW sites --- Development of Web sites --- Personal Home Page (Computer program language) --- Development --- Computer science. --- Data encryption (Computer science). --- Computer Science. --- Computer Science, general. --- Data Encryption. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Informatics --- Science --- Computer network resources --- Internet programming --- Programming languages (Electronic computers) --- Computer programming. --- Software engineering. --- Web Development. --- Software Engineering/Programming and Operating Systems. --- Cryptology. --- Computer software engineering --- Engineering --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Programming --- Internet programming. --- Cryptography. --- Software Engineering. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer programming
Listing 1 - 4 of 4 |
Sort by
|