![](images/graphics/blank.gif)
Ebook Mobile application security
-
Ebook "Certified Ethical Hacker (CEH): Foundation guide" includes contents: Chapter 1: operating system basics; chapter 2: database basics; chapter 3: networking basics; chapter 4: programming basics for security enthusiasts and hackers; chapter 5: virtualization and cloud basics; chapter 6: information security basics; chapter 7: penetration testing; chapter 8: information gathering; chapter 9: hacking basics; chapter 10: web application hacking; chapter 11: wireless hacking; chapter 12: hacking mobile platforms; chapter 13: IDSes, firewalls, and honeypots; chapter 14: cryptography.
207p
haojiubujain010
14-12-2023
5
2
Download
-
Ebook CEHv9 Certified Ethical Hacker Version 9 (Study guide): Part 2 includes contents: Chapter 11: denial of service, chapter 12: session hijacking, chapter 13: web servers and applications, chapter 14: SQL injection, chapter 15: hacking wi-fi and bluetooth, chapter 16: mobile device security, chapter 17: evasion, chapter 18: cloud technologies and security, chapter 19: physical security.
342p
haojiubujain010
14-12-2023
5
1
Download
-
Ebook "Mobile developers guide to the galaxy" includes content: Prologue, conceptional design for mobile, blackberry java apps, windows phone & windows rt, going cross platform, mobile sites & web technologies, mobile analytics, implementing rich media, implementing location based services, near field communication, implementing haptic vibration, implementing augmented reality, application security,...and other contents.
256p
haojiubujain07
20-09-2023
7
3
Download
-
Ebook "Learning node.js for mobile application development" includes content: Setting up your workspace, configuring persistence with mongoDB, creating an API, securing your backend, real time data and websockets, introducing ionic, building user interfaces, making our app interactive, accessing native phone features, working with apis,... and other contents.
248p
haojiubujain07
20-09-2023
6
2
Download
-
Ebook "RFID handbook - Applications, technology, security and privacy" includes content: Physics and geometry of RFID, EPCglobal network, design automation for RFID tags and systems, contemporary RFID reader architecture, progress in RFID education, progress in RFID education, RFID reader synchronization, triage with RFID tags for massive incidents, RFID and NFC on mobile phones, privacy and personal information protection in RFID systems,... and other contents.
714p
haojiubujain07
20-09-2023
8
4
Download
-
Ebook Developers guide to web application security: Part 1 includes contents: Chapter 1 hacking methodology, chapter 2: how to avoid becoming a code grinder, chapter 3: understanding the risk associated with mobile code, chapter 4: vulnerable CGI scripts, chapter 5: hacking techniques and tools, chapter 6: code auditing and reverse engineeering.
250p
haojiubujain06
05-09-2023
11
4
Download
-
Ebook Web services security and e-business: Part 1 includes contents: Chapter I Wireless LAN setup and security loopholes; Chapter II Wireless web security using a neural network-based cipher; Chapter III RFID systems: Applications vs. security and privacy implications; Chapter IV Mobile code and security issues; Chapter V A survey of key generation for secure multicast communication protocols;…
200p
haojiubujain06
06-09-2023
12
4
Download
-
This book is aimed at developers who want to launch their startup with no outside funding. It’s for companies started by real developers solving real pain points using desktop, web and mobile applications. This book intentionally avoids topics restricted to venturebacked startups such as: honing your investor pitch, securing funding, and figuring out how to use the piles of cash investors keep placing in your lap.
214p
haojiubujain03
24-07-2023
6
5
Download
-
Ebook IT Governance: An international guide to data security and ISO27001-ISO27002 - Part 1 includes contents: Chapter 1 Why is information security necessary? Chapter 2 The UK combined code, the FRC risk guidance and Sarbanes – Oxley; Chapter 3 ISO27001; Chapter 4 Organizing information security; Chapter 5 Information security policy and scope; Chapter 6 The risk assessment and Statement of Applicability; Chapter 7 Mobile devices; Chapter 8 Human resources security; Chapter 9 Asset management; Chapter 10 Media handling; Chapter 11 Access control; Chapter 12 User access management; Chapter ...
191p
haojiubujain02
03-07-2023
6
4
Download
-
Ebook Building the e-service society: E-commerce, e-business, and e-government - Part 1 includes the following content: Chapter 1: Towards key business process for e-government; Chapter 2: An intelligent search engine for electronic government applications for the resolutions of the united nations security council; Chapter 3: Knowledge in e-government; Chapter 4: Democracy in the electronic government era; Chapter 5: Usability evaluation as quality assurance of e-government services; Chapter 6: Rethinking trust and confidence in european e-government; Chapter 7: Exploring the relationship b...
239p
haojiubujain01
06-06-2023
8
5
Download
-
This book "CompTIA® Security+: Guide to Network Security Fundamentals" is designed to meet the needs of students and professionals who want to master basic information security. Part 1 of book provide students with knowledge about: introduction to security; threat management and cyber security resources; threats and attacks on endpoints; endpoint and application development security; mobile, embedded, and specialized device security; basic cryptography; public key infrastructure and cryptographic protocols;...
244p
britaikridanik
05-07-2022
36
9
Download
-
(bq) chapters will allow you to fully grasp many of the technical issues introduced in the top 15 list as well as a few new ones. for example, although sms is not a mobile application, it is used heavily by many mobile applications today, even for security purposes.
432p
nguyenbg98
29-08-2018
30
4
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)