You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-...
Reprint of the original, first published in 1878.
Reprint of the original, first published in 1878.
This book constitutes the thoroughly refereed post-workshop proceedings of the 19th International Workshop on Security Protocols, held in Cambridge, UK, in March 2011. Following the tradition of this workshop series, each paper was revised by the authors to incorporate ideas from the workshop, and is followed in these proceedings by an edited transcription of the presentation and ensuing discussion. The volume contains 17 papers with their transcriptions as well as an introduction, i.e. 35 contributions in total. The theme of the workshop was "Alice doesn't live here anymore".
Secure today's mobile devices and applications Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this comprehensive resource. Design highly isolated, secure, and authenticated mobile applications Use the Google Android emula...
Verse and Transmutation: A Corpus of Middle English Alchemical Poetry identifies and investigates a corpus of twenty-one anonymous Middle English recipes for the philosophers’ stone through critical editions and studies on their histories in early modern manuscripts, literature and libraries.
Aleocharine beetles are among the most poorly known and difficult-to-identify groups of Coleoptera worldwide. This book presents the first comprehensive synopsis of aleocharine rove beetle species (Coleoptera, Staphylinidae) from British Columbia, Canada. It is important to generate a structured inventory of species in hotspots of biodiversity like British Columbia, to provide baseline biodiversity data for monitoring species responses related to climate change. It is the first book to treat and illustrate every recorded and new species. For every species, color illustrations are provided, including color habitus and genital diagnostic structures of both sexes. Two hundred and twenty-seven v...
"Based on a workshop on Regional Approaches to Parks and Protected Areas in North America, held at Tijuana, Mexico, March 1999"--p. xv.