Security Books
-
Visual Studio Tools for Office: Using C# with Excel, Word, Outlook, and InfoPath (Microsoft .NET Development Series)
Published 15 years ago
by Eric Carter, Eric Lippert, Addison-Wesley Professional
Visual Studio Tools for Office (VSTO) was released in August of 2003. It brought the power of .NET to developing Word and Excel applications. While powerful, it was also lacking in some key features, and difficult to use. VSTO 2005 will be released as part of the Whidbey release. It will be incorporated in the more advanced versions of Visual Studio .NET 2005, and will also be available as a stand-alone product.
-
Pro PHP Security
Published 15 years ago includes sample chapter
by Chris Snyder, Michael Southwell, Apress
Pro PHP Security is one of the first books devoted solely to PHP security. It will serve as your complete guide for taking defensive and proactive security measures within your PHP applications. (And the methods discussed are compatible with PHP versions 3, 4, and 5.) The knowledge you'll gain from this comprehensive guide will help you prevent attackers from potentially disrupting site operation or destroying data.
-
Beginning Cryptography with Java
Published 15 years ago
by David Hook, Wrox
Beginning Cryptography with Java While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications-if you know how. This book teaches you how.
-
MySQL in a Nutshell (In a Nutshell (O'Reilly))
Published 15 years ago
by Russell Dyer, O'Reilly Media
MySQL is the world's most popular open source database. MySQL is designed for speed, power, and flexibility in mission-critical, heavy-use environments and modest applications as well. It's also surprisingly rich in features. If you're a database administrator or programmer you probably love the myriad of things MySQL can do, but sometimes wish there wasn't such a myriad of things to remember.
-
Microsoft Log Parser Toolkit
Published 16 years ago
by Gabriele Giuseppini, Mark Burnett, Jeremy Faircloth, Dave Kleiman, Syngress
Ready-to-Use Scripts from Log Parser Pioneers Including Gabriele Giuseppini, Developer of Microsoft Log Parser ? Analyze the Log Files from Windows Server, Snort IDS, NetMon, IIS Server, Exchange Server, and More ? Web Site Provides Hundreds of Original, Working Scripts to Automate Tasks Step-by-Step Instructions for Using Log Parser to Data Mine All Your Logs With Log Parser, you create the data processing pipeline that best fits your needs. However, Log Parser?
-
Honeypots for Windows
Published 16 years ago includes sample chapter
by Roger A. Grimes, Apress
...a handy book to keep as a general security reference. — Lou Vega, member, Greater Charleston . ...this looks like it'd be cool as h3ll to really do. — Bill Ryan, Bill's House O Insomnia Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, almost every book and resource about honeypots comes from a Unix background, which leaves Windows administrators still grasping for help.
-
Hardening Linux
Published 16 years ago includes sample chapter
by James Turnbull, Apress
James Turnbull is an IT&T Security Consultant at the Commonwealth Bank of Australia. He is an experienced infrastructure architect with a background in Linux/Unix, AS/400, Windows, and Storage systems. He has been involved in security consulting, infrastructure security design, SLA & support services design, and business application support.
-
Black Hat Physical Device Security: Exploiting Hardware and Software
Published 16 years ago
by Drew Miller, Syngress
This book presents a methodology to approach and detect similar types of vulnerabilities in individual security devices that plague the software industry. Bypassing key components in a security system can negate the presence of other subsystems. Our content supplies an applicable process of assessment that will never age.
-
Java Threads
Published 16 years ago
by Scott Oaks, Henry Wong, O'Reilly Media
Building sophisticated Java applets means learning about threading--if you need to read data from a network, for example, you can't afford to let a delay in its delivery lock up your entire applet. Java Threads introduces the Java threading API and uses non-computing analogies--such as scenarios involving bank tellers--to explain the need for synchronization and the dangers of deadlock.
-
Tomcat 5 Unleashed
Published 16 years ago
by Lajos Moczar, Sams
Tomcat is the most widely used Java-based Web application server available, and the latest version, Tomcat 5.x, has a variety of features that allow developers and administrators to create and maintain sophisticated enterprise-level Web applications.