• Ebook Tourism theory: Concepts, models and systems - Part 2

    Ebook Tourism theory: Concepts, models and systems - Part 2

    Continued part 1, part 2 of ebook "Tourism theory: Concepts, models and systems" provides readers with contents including: the tourist; intermediation, distribution and travel; the tourism destination; determinant and motivational factors; crompton’s destination-choice model; traveller typologies; tourism distribution channels; multi-destination travel pattern models; tourism services and facilities; tourism infrastructure; lodging...

     121 p vlute 26/01/2024 17 0

  • Ebook Tourism theory: Concepts, models and systems - Part 1

    Ebook Tourism theory: Concepts, models and systems - Part 1

    Part 1 of ebook "Tourism theory: Concepts, models and systems" provides readers with contents including: fundamental concepts; general systems theory and tourism; tourism and travel; food and beverage; authenticity in tourism; disciplines and areas of study; jafari’s interdisciplinary model; the anthropology of tourism; culture and tourism; postmodernity and tourism; psychology and tourism; the sociology of tourism;...

     149 p vlute 26/01/2024 16 0

  • Ebook City spaces - Tourist places: Urban tourism precincts - Part 1

    Ebook City spaces - Tourist places: Urban tourism precincts - Part 1

    Part 1 of ebook "City spaces - Tourist places: Urban tourism precincts" provides readers with contents including: urban tourism precincts; the evolution of the tourism precinct; places and people; urban tourism precincts; precincts within the urban form; the structure and form of urban tourism precincts; contribution of urban precincts to the urban economy; the tourist experience of precincts;...

     221 p vlute 26/01/2024 14 0

  • Ebook City spaces - Tourist places: Urban tourism precincts - Part 2

    Ebook City spaces - Tourist places: Urban tourism precincts - Part 2

    Continued part 1, part 2 of ebook "City spaces - Tourist places: Urban tourism precincts" provides readers with contents including: conflicts and politics in precinct development; visitor–host relationships; precinct planning and design, management and marketing; Grote market Groningen; darling harbour; Sheffield city centre; exploiting the benefits of world heritage listing; lessons for theory and practice;...

     179 p vlute 26/01/2024 14 0

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 2

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 2

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) – Part 2 includes contents: Chapter 6 input injection attacks, chapter 7 attacking XML web services, chapter 8 attacking web application management, chapter 9 hacking web clients, chapter 10 the enterprise web application security program, A: Web application security checklist, B: Web hacking tools and techniques cribsheet.

     233 p vlute 25/01/2024 12 0

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1

    Ebook Hacking exposed web applications: Web application security secrets and solutions (Third edition) –Part 1 includes contents: Chapter 1 hacking web apps 101, chapter 2 profiling, chapter 3 hacking web platforms, chapter 4 attacking web authentication, chapter 5 attacking web authorization.

     248 p vlute 25/01/2024 14 0

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (First edition) –Part 1

    Ebook Hacking exposed web applications: Web application security secrets and solutions (First edition) –Part 1

    Ebook Hacking exposed web applications: Web application security secrets and solutions (First edition) – Part 1 includes contents: Chapter 1 introduction to web applications and security, chapter 2 profiling, chapter 3 hacking web servers, chapter 4 surveying the application.

     155 p vlute 25/01/2024 11 0

  • Ebook Hacking exposed web applications: Web application security secrets and solutions (First edition) –Part 2

    Ebook Hacking exposed web applications: Web application security secrets and solutions (First edition) –Part 2

    Ebook Hacking exposed web applications: Web application security secrets and solutions (First edition) – Part 2 includes contents: Chapter 5 authentication; chapter 6 authorization; chapter 7 attacking session state management; chapter 8 input validation attacks; chapter 9 attacking web datastores; chapter 10 attacking web services; chapter 11 hacking web application management; chapter 12 web client hacking; chapter 13 case studies;...

     261 p vlute 25/01/2024 11 0

  • Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 2 includes contents: Chapter 8 achieving stealth and maintaining presence, chapter 9 hacking SQL server, chapter 10 hacking Microsoft client apps, chapter 11 physical attacks, chapter 12 windows security features and tools, chapter a windows security checklist, chapter b about the companion website.

     230 p vlute 25/01/2024 7 0

  • Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1

    Ebook Hacking exposed windows: Windows security secrets & solutions (Third edition) – Part 1 includes contents: Chapter 1 information security basics, chapter 2 the windows security architecture from the hacker's perspective, chapter 3 footprinting and scanning, chapter 4 enumeration, chapter 5 hacking windows-specific services, chapter 6 discovering and exploiting windows vulnerabilities, chapter 7 post-exploit pillaging.

     252 p vlute 25/01/2024 6 0

  • Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 2

    Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 2

    Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 2 includes contents: Chapter 10: exploiting path traversal, chapter 11: attacking application logic, chapter 12: attacking other users, chapter 13: automating bespoke attacks, chapter 14: exploiting information disclosure, chapter 15: attacking compiled applications, chapter 16: attacking application architecture, chapter 17: attacking the web...

     404 p vlute 25/01/2024 5 0

  • Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1

    Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1

    Ebook The web application hacker’s handbook: Discovering and exploiting security flaws - Part 1 includes contents: Chapter 1: web application (in)security, chapter 2: core defense mechanisms, chapter 3: web application technologies, chapter 4: mapping the application, chapter 5: bypassing client-side controls, chapter 6: attacking authentication, chapter 7: attacking session management, chapter 8: attacking access controls, chapter 9:...

     367 p vlute 25/01/2024 3 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=vlute
getDocumentFilter3 strKey=LIBTAILIEU2_LIST_FILTERvlute669480vi