Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Biographical note: Long description:
Hacking --- IT-Sicherheit --- IT-Security --- penetrationstest --- Zugriffsrechte --- hacken --- LASAA-Proezess --- NTLM-Hash --- Passwort-Hash --- Passwort
Choose an application
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack
Information Technology --- General and Others --- Computer security --- Internet --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Security measures --- Protection --- PXL-Central Office 2014 --- computerbeveiliging --- hacken --- Computer security. --- Security measures.
Choose an application
Penetration testing (Computer security) --- Computer hackers --- Computer software --- Computer crimes --- Pirates informatiques --- Logiciels --- Criminalité informatique --- Testing --- Prevention --- Essais --- Prévention --- AA / International- internationaal --- 654 --- 681.3*D46 --- 681.3*K41 --- Informatieverwerking. Bureautica. --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Public policy issues: abuse and crime involving computers, computer-related health issues, ethics, human safety, intellectual property rights, privacy, regulation, transborder data flow, use/abuse of power --- Tests d'intrusion --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Hackers. --- Criminalité informatique --- Prévention --- Ethical hacking (Computer security) --- Computer security --- Software, Computer --- Computer systems --- Computer programmers --- Computer users --- Informatieverwerking. Bureautica --- PXL-Central Office 2014 --- computerbeveiliging --- hacken --- Testing.
Choose an application
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve. Attacks featured in this
Application software - Security measures. --- Computer crimes - Prevention. --- Computer networks - Security measures. --- Computer networks -- Security measures. --- Computer networks. --- Computer security. --- Web site development - Security measures. --- Web sites -- Security measures. --- Computer networks --- Web site development --- Application software --- Computer security --- Computer crimes --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Prevention --- Security measures. --- Prevention. --- Information Technology --- General and Others --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Development of Web sites --- Web sites --- Computer network security --- Network security, Computer --- Security of computer networks --- Development --- Protection of computer systems --- Protection --- Data protection --- Security systems --- Hacking --- Computer software --- Internet programming --- 004.5 --- apps --- hacken --- Mens-computer interactie. Mens-machine interface. User interface. Gebruikersomgeving
Listing 1 - 4 of 4 |
Sort by
|