Security Books
-
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Published 13 years ago
by Rich Cannings, Himanshu Dwivedi, Zane Lackey, McGraw-Hill Osborne Media
Lock down next-generation Web services"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, FacebookProtect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.
-
Professional Silverlight 2 for ASP.NET Developers (Wrox Programmer to Programmer)
Published 12 years ago
by Jonathan Swift, Salvador Alvarez Patuel, Chris Barker, Dan Wahlin, Wrox
Our overarching goal in writing this book was to give ASP.NET developers the power to quickly and easily create visually stunning Internet applications, coupled with rich interactivity to fully immerse the user in a new online experience. Silverlight gives you everything you need to do just this, and in serious style! As well as taking you through each feature that ships with Silverlight, this book will make sure you're able to debug, troubleshoot, and performance-tune your Silverligh
-
Real World Microsoft Access Database Protection and Security
Published 17 years ago includes sample chapter
by Garry Robinson, Apress
Author Garry Robinson approaches this book differently than other Access books on the market: he keeps the focus on issues that will help protect your database. Written from an experienced developer's point of view, he discusses protection and security task-by-task. You'll learn to hide tables as system tables, produce databases difficult to crack, and back up databases.
-
Professional ASP.NET 2.0
Published 15 years ago
by Bill Evjen, Scott Hanselman, Farhan Muhammad, Srinivasa Sivakumar, Devin Rader, Wrox
All new, for ASP.NET 2.0, this bestselling book provides experienced developers with real-world examples of the powerful new time-saving, code-saving features in this new version. Seasoned author Bill Evjen helps developers make a smooth transition to this new version of ASP.NET with his clear explanations of even the most dramatic changes.
-
Hardening Apache
Published 16 years ago includes sample chapter
by Tony Mobily, Apress
This is a book which should definitely be included in any serious Apache administrator's bookshelf. The book walks intuitively through the setup process, from download and verification, to configuration and modifications, to running in production mode. — Blane Warrene, Expert Columnist, SitePoint. This book can save you pain, humiliation, and hair loss.
-
ASP.NET 3.5 Enterprise Application Development with Visual Studio 2008: Problem Design Solution (Wrox Programmer to Prog
Published 12 years ago
by Vincent Varallo, Wrox
Aimed at enterprise developers who use Visual Studio 2008, ASP.NET, C#, and SQL Server to deliver business applications, this book focuses on implementing patterns that can be used for real-world solutions. Each chapter establishes a problem, examines which solution will provide the best results, and then demonstrates how to go about executing that solution. The experienced author addresses building a framework for corporate intranet apps, designing the data access layer, implementing the Micros
-
Hardening Linux
Published 16 years ago includes sample chapter
by James Turnbull, Apress
James Turnbull is an IT&T Security Consultant at the Commonwealth Bank of Australia. He is an experienced infrastructure architect with a background in Linux/Unix, AS/400, Windows, and Storage systems. He has been involved in security consulting, infrastructure security design, SLA & support services design, and business application support.
-
J2EE Design Patterns
Published 17 years ago
by William Crawford, Jonathan Kaplan, O'Reilly Media
Architects of buildings and architects of software have more in common than most people think. Both professions require attention to detail, and both practitioners will see their work collapse around them if they make too many mistakes. It's impossible to imagine a world in which buildings get built without blueprints, but it's still common for software applications to be designed and built without blueprints, or in this case, design patterns.
-
C# Complete
Published 18 years ago
by Sybex, Sybex
C# Complete is a one-of-a-kind book--valuable both for its broad content and its low price. Whether you're brand-new to C# programming, are migrating from Visual Basic or Visual C++ to C#, or have already developed some expertise in C#, you'll get the skills you need to become proficient with Microsoft's powerful new language designed for the .NET platform. Creating complex applications in the .NET Framework is made easier with C#--Microsoft's first true object-oriented programming language.
-
Black Hat Physical Device Security: Exploiting Hardware and Software
Published 16 years ago
by Drew Miller, Syngress
This book presents a methodology to approach and detect similar types of vulnerabilities in individual security devices that plague the software industry. Bypassing key components in a security system can negate the presence of other subsystems. Our content supplies an applicable process of assessment that will never age.