Security cookbook

Xem 1-20 trên 40 kết quả Security cookbook
  • This book is for SQL Server administrators, developers, and consultants who want to secure their SQL Server database with cutting edge techniques for data and code encryption, user authentication and authorization, protection against brute force attacks, denial-of-service attacks, and SQL Injection, securing business intelligence, and more. Working knowledge of SQL Server is expected.

    pdf322p titatu_123 01-03-2013 60 23   Download

  • This text is aimed at technicians, hobbyists, and students and provides complete circuit diagrams and building instructions for a wide range of creative sleuthing applications. The designs are fully tested and proven effective in real-world alarm, sensor, and security equipment. Among the circuits highlighted are a multi-purpose high-gain amplifier, temperature and pressure sensors, vibration and pyroelectric sensors, smoke and toxic gas detectors, tachometer/speed gauges, a remote video and control system, door and window alarms, motion and impact detectors and tone signalling sensors.

    pdf296p ndkhuong177 20-06-2012 156 62   Download

  • [ Team LiB ] Recipe 1.8 Connecting to SQL Server Using Integrated Security from ASP.NET Problem You want to coordinate Windows security accounts between an ASP.NET application and SQL Server.

    pdf2p luvpro 04-08-2010 123 21   Download

  • While the REST design philosophy has captured the imagination of web and enterprise developers alike, using this approach to develop real web services is no picnic. This cookbook includes more than 100 recipes to help you take advantage of REST, HTTP, and the infrastructure of the Web. You'll learn ways to design RESTful web services for client and server applications that meet performance, scalability, reliability, and security goals, no matter what programming language and development framework you use....

    pdf314p stingdau_123 19-01-2013 52 12   Download

  • Take your WordPress site to the next level with solutions to common WordPress problems that make your site better, smarter, faster, and more secure Enhance your SEO and make more money online by applying simple hacks Rich with screenshots and practical tasks that you will find quite useful

    pdf329p hoa_can 05-02-2013 22 10   Download

  • The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can’t explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms.

    pdf354p hoa_can 05-02-2013 36 10   Download

  • Web applications suffer more than their share of security attacks. Here’s why. Websites and the applications that exist on them are in some sense the virtual front door of all corporations and organizations. Growth of the Web since 1993 has been astounding, outpacing even the adoption of the television and electricity in terms of speed of widespread adoption. Web applications are playing a growing and increasingly prominent role in software development. In fact, pundits currently have us entering the era of Web 3.0 (see http: //www.informit.com/articles/article.aspx?p=1217101).

    pdf314p hotmoingay3 09-01-2013 34 7   Download

  • Secure your Java applications using Java EE built-in features as well as the well-known Spring Security framework Utilize related recipes for testing various Java EE technologies including JPA, EJB, JSF, and Web services Explore various ways to extend a Java EE environment with the use of additional dynamic languages as well as frameworks A learn-by-example based approach that focuses on key concepts to provide the foundation to solve real world problems

    pdf210p hoa_can 29-01-2013 33 7   Download

  • Paulino Calderón Pale (@calderpwn) is a very passionate software developer and penetration tester from a Caribbean island in México called Cozumel. He learned to write code and administer IT infrastructures early in his life—skills that came handy when he joined the information security industry. Today, he loves learning new technologies, penetration testing, conducting data-gathering experiments, developing software, and contributing to the open source community.

    pdf318p phungnguyet_123 25-02-2013 30 7   Download

  • [ Team LiB ] Recipe 5.8 Transferring Login Credentials Securely Problem You need to protect login credentials during transmission over the network and when they are stored within a database. Solution Use password hashing and salting with the .NET FormsAuthentication class to control user

    pdf5p luvpro 04-08-2010 43 6   Download

  • Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can be used to secure apps and how developers can use and incorporate these security features into their apps. This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.

    pdf236p caucaphung 02-02-2013 30 7   Download

  • pfSense is an open source distribution of FreeBSD-based firewall that provides a platform for flexible and powerful routing and firewalling. The versatility of pfSense presents us with a wide array of configuration options, which makes determining requirements a little more difficult and a lot more important, compared to other offerings. Through this book you will see that pfSense offers numerous alternatives to fit any environment’s security needs.

    pdf252p hoa_can 05-02-2013 38 10   Download

  • [ Team LiB ] Recipe 5.7 Transmitting a DataSet Securely Problem You need to securely send a DataSet over a connection that is not secure. Solution Encrypt and decrypt the DataSet using the .NET cryptographic services, and serialize and save the encrypted DataSet to a stream (such as a file or network stream).

    pdf12p luvpro 04-08-2010 57 5   Download

  • As an open source, distributed, big data store, HBase scales to billions of rows, with millions of columns and sits on top of the clusters of commodity machines. If you are looking for a way to store and access a huge amount of data in real time, then look no further than HBase. HBase Administration Cookbook provides practical examples and simple step-by-step instructions for you to administrate HBase with ease. The recipes cover a wide range of processes for managing a fully distributed, highly available HBase cluster on the cloud.

    pdf332p hotmoingay3 09-01-2013 36 5   Download

  • Java EE 6 Cookbook for Securing, Tuning, and Extending Enterprise Applications Packed with comprehensive recipes to secure, tune, and extend your Java EE applications professional expertise distilled . Neither the author, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals.

    pdf356p hoa_can 29-01-2013 26 5   Download

  • Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again A unique author team-a blend of industry and underground experts- explain the techniques that readers can use to uncover security holes in any software or operating system Shows how to pinpoint vulnerabilities in popular operating systems (including Windows, Linux, and Solaris) and applications (including MS SQL Server and Oracle databases)...

    pdf744p hoa_can 05-02-2013 29 5   Download

  • Connecting to a Secured Access Database Problem You want to connect to a Microsoft Access database that has been secured with user-level security and a workgroup file. Solution Use the Jet OLEDB:System Database attribute in the connection string to specify the path and filename of the workgroup information file or system database.

    pdf3p luvpro 04-08-2010 54 3   Download

  • Thor’s Microsoft® Security Bible provides a “one-stop-shop” for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.) and also includes new, never-before-published security tools complete with source code. ...

    pdf328p hoa_can 05-02-2013 25 3   Download

  • The KNIGHTMARE Introduction by Gareth Branwyn Sound Bytes from Reviews of Secrets of a Super Hacker "Secrets of a Super Hacker is a fascinating hacker cookbook that reveals the ease of penetrating even the most stalwart computer system." -The San Francisco Chronicle "Not often do the contents of a book match its cover hype, but here is one book that comes closer than most. Secrets of a Super Hacker, by The Knightmare, is billed as 'every security manager's worst nightmare.' It does, indeed, descend into the realm of security managers’ darkest fears." - Info security News ......

    pdf233p babylove117x 31-03-2011 150 91   Download

  • There is often felt to be something odd about negative components, such as negative resistance or inductance, an arcane aura setting them apart from the real world of practical circuit design.This text is aimed at technicians, hobbyists, and students and provides complete circuit diagrams and building instructions for a wide range of creative sleuthing applications. The designs are fully tested and proven effective in real-world alarm,...

    pdf352p haidang1 17-12-2009 159 72   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản