- Bạn vui lòng tham khảo Thỏa Thuận Sử Dụng của Thư Viện Số
Tài liệu Thư viện số
Danh mục TaiLieu.VN
Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) – Part 2 includes contents: Chapter 6 input injection attacks, chapter 7 attacking XML web services, chapter 8 attacking web application management, chapter 9 hacking web clients, chapter 10 the enterprise web application security program, A: Web application security checklist, B: Web hacking tools and techniques cribsheet.
233 p vlute 25/01/2024 16 0
Từ khóa: Hacking exposed, Ebook Hacking exposed, Ebook Hacking exposed web applications, Hacking exposed web, Web application security secrets, Attacking XML web services, Attacking web application management
Ebook Web services security and e-business: Part 1
Ebook Web services security and e-business: Part 1 includes contents: Chapter I Wireless LAN setup and security loopholes; Chapter II Wireless web security using a neural network-based cipher; Chapter III RFID systems: Applications vs. security and privacy implications; Chapter IV Mobile code and security issues; Chapter V A survey of key generation for secure multicast communication protocols;…
200 p vlute 23/10/2023 48 0
Từ khóa: Web services security, Computer networks, Security measures, Web services, Electronic commerce, Computer security, Security loopholes, Wireless web security
Ebook Web services security and e-business: Part 2
Ebook Web services security and e-business: Part 2 includes contents: Chapter X Verifiable encryption of digital signatures using elliptic curve digital signature algorithm and its implementation issues; Chapter XI An introductory study on business intelligence security; Chapter XII Secure trust transfer using chain signatures; Chapter XIII Distributed intrusion detection systems: An overview;…
210 p vlute 23/10/2023 49 0
Từ khóa: Web services security, Computer networks, Security measures, Web services, Electronic commerce, Computer security, Verifiable encryption of digital signatures, Business intelligence security