You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Master the art of web exploitation with real-world techniques on SAML, WordPress, IoT, ElectronJS, and Ethereum smart contracts Purchase of the print or Kindle book includes a free PDF eBook Key Features Learn how to detect vulnerabilities using source code, dynamic analysis, and decompiling binaries Find and exploit vulnerabilities such as SQL Injection, XSS, Command Injection, RCE, and Reentrancy Analyze real-world security incidents based on MITRE ATT&CK to understand the risk at the CISO level Book DescriptionWeb attacks and exploits pose an ongoing threat to the interconnected world. This comprehensive book explores the latest challenges in web application security, providing you with a...
This book examines agile approaches from a management perspective by focusing on matters of strategy, implementation, organization and people. It examines the turbulence of the marketplace and business environment in order to identify what role agile management has to play in coping with such change and uncertainty. Based on observations, personal experience and extensive research, it clearly identifies the fabric of the agile organization, helping managers to become agile leaders in an uncertain world. The book opens with a broad survey of agile strategies, comparing and contrasting some of the major methodologies selected on the basis of where they lie on a continuum of ceremony and formal...
Cet ouvrage aborde la question de la pratique testamentaire des habitants de San Gimignano en Italie de 1299 Gimignano en Italie de 1299 à 1530, en mettant en relation le contenu des actes des membres d'une même famille sur plusieurs générations. Par une analyse reposant sur un corpus documentaire d'environ mille actes (testaments, codicilles, exécutions testamentaires et déclarations faites aux officiers du Cadastre), l'auteur souligne la dimension spirituelle présente dans le choix des bénéficiaires des legs pieux et du lieu de sépulture. Cette dernière permet de mesurer les marques de piété et d'entrevoir les efforts finalisés au regroupement familial dans le tombeau. Elle met également en lumière les stratégies patrimoniales mises en oeuvre pour la sauvegarde des biens ainsi que la politique matrimoniale des grandes familles de San Gimignano - qui se sont rapprochées de Florence dès la fin du XIVe siècle. Cette double lecture met en évidence l'importance d'une bonne connaissance du contexte familial des testateurs pour une meilleure compréhension du contenu des actes.
Il Web si e presentato ai suoi utenti come il piA' innovativo e rivoluzionario dei media. Siamo pero ben lungi dalla piena realizzazione delle sue potenzialita. Ecco quindi che il media potenzialmente piA' democratico e attualmente mortificato da approcci miopi e fuorvianti e dall'utilizzo di modelli di business aleatori o inesistenti. Di tutto questo il libro vuole occuparsi, alla luce dei piA' recenti sviluppi del Web - il cosiddetto Web 2.0 - e di quel che rischia di essere soltanto una grande cortina fumogena, in grado di occultare anche i tanti aspetti intriganti, divertenti ed utili che le applicazioni di tipo collaborativo pure contengono. Il tutto restituendo finalmente la giusta luce e dignita a chi e autore e lettore del Web, a chi crea un sito o un'applicazione e a chi cerca di fruirne i contenuti: l'utente, l'individuo, l'uomo.
None
A comprehensive guide to effectively understand web attacks for web application security, featuring real-world bug bounty hunting techniques, CVEs, and CTFs Purchase of the print or Kindle book includes a free PDF eBook Key Features: Learn how to find vulnerabilities using source code, dynamic analysis, and decompiling binaries Find and exploit vulnerabilities such as SQL Injection, XSS, Command Injection, RCE, and Reentrancy Analyze real security incidents based on MITRE ATT&CK to understand the risk at the CISO level Book Description: Web attacks and exploits pose an ongoing threat to the interconnected world. This comprehensive book explores the latest challenges in web application securi...
None