intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Ebook Mobile application security

Xem 1-12 trên 12 kết quả Ebook Mobile application security
  • Ebook "Certified Ethical Hacker (CEH): Foundation guide" includes contents: Chapter 1: operating system basics; chapter 2: database basics; chapter 3: networking basics; chapter 4: programming basics for security enthusiasts and hackers; chapter 5: virtualization and cloud basics; chapter 6: information security basics; chapter 7: penetration testing; chapter 8: information gathering; chapter 9: hacking basics; chapter 10: web application hacking; chapter 11: wireless hacking; chapter 12: hacking mobile platforms; chapter 13: IDSes, firewalls, and honeypots; chapter 14: cryptography.

    pdf207p haojiubujain010 14-12-2023 5 2   Download

  • Ebook CEHv9 Certified Ethical Hacker Version 9 (Study guide): Part 2 includes contents: Chapter 11: denial of service, chapter 12: session hijacking, chapter 13: web servers and applications, chapter 14: SQL injection, chapter 15: hacking wi-fi and bluetooth, chapter 16: mobile device security, chapter 17: evasion, chapter 18: cloud technologies and security, chapter 19: physical security.

    pdf342p haojiubujain010 14-12-2023 5 1   Download

  • Ebook "Mobile developers guide to the galaxy" includes content: Prologue, conceptional design for mobile, blackberry java apps, windows phone & windows rt, going cross platform, mobile sites & web technologies, mobile analytics, implementing rich media, implementing location based services, near field communication, implementing haptic vibration, implementing augmented reality, application security,...and other contents.

    pdf256p haojiubujain07 20-09-2023 7 3   Download

  • Ebook "Learning node.js for mobile application development" includes content: Setting up your workspace, configuring persistence with mongoDB, creating an API, securing your backend, real time data and websockets, introducing ionic, building user interfaces, making our app interactive, accessing native phone features, working with apis,... and other contents.

    pdf248p haojiubujain07 20-09-2023 6 2   Download

  • Ebook "RFID handbook - Applications, technology, security and privacy" includes content: Physics and geometry of RFID, EPCglobal network, design automation for RFID tags and systems, contemporary RFID reader architecture, progress in RFID education, progress in RFID education, RFID reader synchronization, triage with RFID tags for massive incidents, RFID and NFC on mobile phones, privacy and personal information protection in RFID systems,... and other contents.

    pdf714p haojiubujain07 20-09-2023 8 4   Download

  • Ebook Developers guide to web application security: Part 1 includes contents: Chapter 1 hacking methodology, chapter 2: how to avoid becoming a code grinder, chapter 3: understanding the risk associated with mobile code, chapter 4: vulnerable CGI scripts, chapter 5: hacking techniques and tools, chapter 6: code auditing and reverse engineeering.

    pdf250p haojiubujain06 05-09-2023 11 4   Download

  • Ebook Web services security and e-business: Part 1 includes contents: Chapter I Wireless LAN setup and security loopholes; Chapter II Wireless web security using a neural network-based cipher; Chapter III RFID systems: Applications vs. security and privacy implications; Chapter IV Mobile code and security issues; Chapter V A survey of key generation for secure multicast communication protocols;…

    pdf200p haojiubujain06 06-09-2023 12 4   Download

  • This book is aimed at developers who want to launch their startup with no outside funding. It’s for companies started by real developers solving real pain points using desktop, web and mobile applications. This book intentionally avoids topics restricted to venturebacked startups such as: honing your investor pitch, securing funding, and figuring out how to use the piles of cash investors keep placing in your lap.

    pdf214p haojiubujain03 24-07-2023 6 5   Download

  • Ebook IT Governance: An international guide to data security and ISO27001-ISO27002 - Part 1 includes contents: Chapter 1 Why is information security necessary? Chapter 2 The UK combined code, the FRC risk guidance and Sarbanes – Oxley; Chapter 3 ISO27001; Chapter 4 Organizing information security; Chapter 5 Information security policy and scope; Chapter 6 The risk assessment and Statement of Applicability; Chapter 7 Mobile devices; Chapter 8 Human resources security; Chapter 9 Asset management; Chapter 10 Media handling; Chapter 11 Access control; Chapter 12 User access management; Chapter ...

    pdf191p haojiubujain02 03-07-2023 6 4   Download

  • Ebook Building the e-service society: E-commerce, e-business, and e-government - Part 1 includes the following content: Chapter 1: Towards key business process for e-government; Chapter 2: An intelligent search engine for electronic government applications for the resolutions of the united nations security council; Chapter 3: Knowledge in e-government; Chapter 4: Democracy in the electronic government era; Chapter 5: Usability evaluation as quality assurance of e-government services; Chapter 6: Rethinking trust and confidence in european e-government; Chapter 7: Exploring the relationship b...

    pdf239p haojiubujain01 06-06-2023 8 5   Download

  • This book "CompTIA® Security+: Guide to Network Security Fundamentals" is designed to meet the needs of students and professionals who want to master basic information security. Part 1 of book provide students with knowledge about: introduction to security; threat management and cyber security resources; threats and attacks on endpoints; endpoint and application development security; mobile, embedded, and specialized device security; basic cryptography; public key infrastructure and cryptographic protocols;...

    pdf244p britaikridanik 05-07-2022 36 9   Download

  • (bq) chapters will allow you to fully grasp many of the technical issues introduced in the top 15 list as well as a few new ones. for example, although sms is not a mobile application, it is used heavily by many mobile applications today, even for security purposes.

    pdf432p nguyenbg98 29-08-2018 30 4   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1446 lượt tải
320 tài liệu
1228 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
6=>0