Security Books
-
Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation
Published 10 years ago
by Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsay, Syngress
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems.
-
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Published 9 years ago
by Andrew Hoog, Syngress
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis.
-
Windows Server 2008 Unleashed
Published 13 years ago
by Rand Morimoto, Michael Noel, Omar Droubi, Ross Mistry, Chris Amaris, Sams
Windows Server 2008 Unleashed covers the planning, design, prototype testing, implementation, migration, administration, and support of a Windows 2008 and Active Directory environment, based on more than three and a half years of early adopter experience in full production environments.
-
Expert Oracle Database Architecture: Oracle Database Programming 9i, 10g, and 11g Techniques and Solutions, Second Editi
Published 10 years ago
by Thomas Kyte, Apress
Now in its second edition, this best-selling book by Tom Kyte of Ask Tom fame continues to bring you some of the best thinking on how to apply Oracle Database to produce scalable applications that perform well and deliver correct results. Tom has a simple philosophy: you can treat Oracle as a black box and just stick data into it or you can understand how it works and exploit it as a powerful computing environment.
-
Foundation Rails 2
Published 12 years ago
by Eldon Alameda, friends of ED
You've heard about this amazing web framework called Ruby on Rails that's taken the world by storm but thought it was way too complex for you? Think again. Foundation Rails 2 takes you through your first steps in Rails, explaining in plain English how to start building dynamic web applications. And there's never been a better time to jump in to the Rails world, as the release of Rails 2 is a major evolutionary leap forward from previous versions.
-
Windows Server 2008 Administrator's Pocket Consultant (Pro - Administrator's Pocket Consultant
Published 13 years ago
by William Stanek, Microsoft Press
Here s the practical, pocket-sized reference for IT professionals who administer and support Windows Server 2008. Designed for quick referencing, this portable guide covers all the essentials for performing everyday system administration tasks. Written by an award-winning author of more than two dozen computer books, this guide puts expert installation, migration, administration, and troubleshooting advice right at your fingertips.
-
VMware vSphere 4 Implementation
Published 11 years ago
by Mike Laverick, McGraw-Hill Osborne Media
Evolve to a virtual network infrastructure using VMware vSphere 4Design and deploy a high-performance cloud-based enterprise IT platform with guidance from a VMware expert. Featuring tips, techniques, and best practices, VMware vSphere 4 Implementation explains how to dramatically cut hardware costs, maximize computing power, and centralize system administration.
-
DNS and BIND (5th Edition)
Published 14 years ago
by Cricket Liu, Paul Albitz, O'Reilly Media
The Domain Naming System (DNS) is a glorious thing. It takes familiar Internet network and machine names (like "amazon.com") and converts them to Internet Protocol (IP) addresses (like "208.35.218.15") that are meaningful to routers and therefore useful for identifying the machine you want to reach. What's amazing is that DNS enables someone in Germany to refer, by name, to a computer in Mongolia even if no one in Germany has ever accessed the distant machine before.
-
Grails in Action
Published 11 years ago
by Glen Smith, Peter Ledbrook, Manning Publications
For web developers used to wrestling with Java and XML, Grails is a breath of fresh air. Developers are instantly productive, picking up all the benefits of the Ruby-based Rails framework without giving up any of the power of Java. Grails in Action is a comprehensive look at Grails for Java developers. It covers the nuts and bolts of the core Grails components and is jam-packed with tutorials, techniques, and insights from the trenches.
-
Microsoft SQL Server 2005 Unleashed
Published 14 years ago
by Ray Rankins, Paul Bertucci, Chris Gallelli, Alex T. Silverstein, Sams
Microsoft SQL Server 2005 Unleashed offers comprehensive coverage of SQL Server 2005 that goes beyond the basic syntax and information you’ll find in the product manuals, providing in-depth information derived from the authors’ real-world experience to help you build upon your working knowledge of the product and take your experience and knowledge to a higher level.