Securing your applications

Xem 1-20 trên 88 kết quả Securing your applications
  • You may know ASP.NET, but if you don't understand how to secure your applications, you need this book. This vital guide explores the often-overlooked topic of teaching programmers how to design ASP.NET Web applications so as to prevent online thefts and security breaches. You'll start with a thorough look at ASP.NET 3.5 basics and see happens when you don't implement security, including some amazing examples. The book then delves into the development of a Web application, walking you through the vulnerable points at every phase.

    pdf440p titatu_123 01-03-2013 42 17   Download

  • you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.

    pdf356p stingdau_123 26-01-2013 22 4   Download

  • pring Security 3.1" is an incremental guide that will teach you how to protect your application from malicious users. You will learn how to cleanly integrate Spring Security into your application using the latest technologies and frameworks with the help of detailed examples. This book is centred around a security audit of an insecure application and then modifying the sample to resolve the issues found in the audit.

    pdf456p titatu_123 01-03-2013 30 9   Download

  • Secure your Java applications using Java EE built-in features as well as the well-known Spring Security framework Utilize related recipes for testing various Java EE technologies including JPA, EJB, JSF, and Web services Explore various ways to extend a Java EE environment with the use of additional dynamic languages as well as frameworks A learn-by-example based approach that focuses on key concepts to provide the foundation to solve real world problems

    pdf210p hoa_can 29-01-2013 27 7   Download

  • There is an invisible elephant in this book: your application. And, it sits at the center of every topic we touch in each chapter we present. This book is for systems architects who are interested in building security into their applications. The book is designed to be useful to architects in three ways: as an introduction to security architecture, as a handbook on security issues for architecture review, and as a catalog of designs to look for within a security product.

    pdf433p ptng13 16-05-2012 33 6   Download

  • With the number of security flaws and exploits discovered and released every day constantly on the rise, knowing how to write secure and reliable applications is become more and more important every day. Written by Ilia Alshanetsky, one of the foremost experts on PHP security in the world, php|architect's Guide to PHP Security focuses on providing you with all the tools and knowledge you need to both secure your existing applications and writing new systems with security in mind.

    pdf201p trasua_123 14-01-2013 127 5   Download

  • When people ask me what I do, in addition to telling them I can show them: I can pull out my cell phone and demonstrate some of the games I’ve written for it. It’s a great time to be a software developer because a pastime that’s so much fun—writing games for cell phones and mobile devices—is now a huge growth industry. The number of cell phones worldwide is well over

    pdf422p tailieuvip13 20-07-2012 24 3   Download

  • Privacy Enhanced Mail (PEM) was the first serious effort to secure Internet mail. The Internet Resources Task Force (IRTF) Privacy and Security Research Group (PSRG) did the initial design. The Internet Engineering Task Force (IETF) PEM Working Group continued development for three years, resulting in a four- part Proposed Internet Standard published in early 1993 [64] [56] [5] [55]. PEM is a broad standard suite, it provides encryption, authentication, message integrity and key management. PEM supports both symmetric and asymmetric (public- key) key management schemes.

    pdf109p cao_can 02-01-2013 21 3   Download

  • Whether you are an experienced Security or System Administrator or a Newbie to the industry, you will learn how to use native, "out-of-the-box", operating system capabilities to secure your UNIX environment. No need for third-party software or freeware tools to be and stay secure! This book will help you ensure that your system is protected from unauthorized users and conduct intrusion traces to identify the intruders if this does occur. It provides you with practical information to use of the native OS security capabilities without the need for a third party security software application....

    pdf44p samsung_12 07-05-2013 15 3   Download

  • Tham khảo sách 'hack proofing: your web applications', công nghệ thông tin, an ninh - bảo mật phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả

    pdf625p maiphuong 11-08-2009 472 219   Download

  • Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features.

    pdf481p m3onh0x84 10-04-2011 125 44   Download

  • In these exercises, you will explore some basic multicast concepts via simple IP multicast applications that have been in usage for several years and are known as Mbone tools. The Mbone was the original implementation of IP multicast on the Internet. In these exercises all the hosts (your PCs) are connected to the same LAN—no multicast routing is needed at this stage.

    pdf51p xuankhuong 03-09-2009 107 28   Download

  • You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure.

    pdf336p titatu_123 01-03-2013 39 15   Download

  • Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own applications using the Microsoft CryptoAPI, and the new security features of Windows 2000. Developers who have been confused by the high-end, academic style of other encryption books and cryptography theory will delight with Chapman's understandable style and hands-on methods.

    pdf606p trac2_123 11-04-2013 34 15   Download

  • Build Your Own ASP.NET Website Using C# & VB.NET guides readers through obtaining, installing and configuring all the necessary software to develop dynamic Websites. Then, it takes readers step-by-step through the process of creating full-blown, practical applications including an intranet, shopping cart with Paypal credit card processing and more. Throughout, the book focuses on best-practice code, ensuring application security and creating professional error handling routines.

    pdf715p trasua_123 06-01-2013 112 13   Download

  • Because you’re looking at a book called PHP & MySQL Everyday Apps For Dummies, I assume you want to build a Web application with the PHP scripting language and a MySQL backend database. If you need to build a dynamic Web application for a specific purpose, you’re in the right place. You will find six popular applications in this book and one additional application chapter on the CD. If the exact application you need isn’t here, you can probably adapt one of the applications to suit your needs....

    pdf406p tailieuvip13 25-07-2012 39 12   Download

  • Although JavaScript is not a class-based language, it is possible to simulate classes using its prototypal structure. Ext JS 4 introduces an entirely new way of defining classes, compared with Ext JS 3. Consequently, when developing with Ext JS 4 your JavaScript's structure will be more closely in line with that of other object oriented languages. This recipe will explain how to define classes using the new system, and give some detail about the features it has to offer. We will do this by creating a custom class to model a vehicle, with a method that will alert some details about it....

    pdf488p hotmoingay3 09-01-2013 46 10   Download

  • PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the 2nd edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also delve into recent developments like mobile security, the impact of JavaScript, and the advantages of recent PHP hardening efforts. Pro PHP Security, Second Edition will serve as your complete guide for taking defensive and proactive security measures within your PHP applications.

    pdf369p goshop_123 23-04-2013 45 10   Download

  • The process of locating and fixing errors in your application is known as debugging. There are no magic tricks to debugging, and there is no fixed sequence of steps that works every time. Basically, debugging helps you understand what is happening when your application runs.

    pdf34p thuxuan 07-08-2009 64 6   Download

  • Been thinking of creating a high-quality interactive Web site? This book is just what you need to get started! Here's the fun and easy way(r) to develop a Web application in PHP 4, 5, or 6 and MySQL 5, test your software, enable your Web pages to display, change, and move database information, and much more.

    pdf459p bluesky_12 19-12-2012 30 5   Download

Đồng bộ tài khoản