• Web Application Defender's Cookbook: Battling Hackers and Protecting Users

    Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants. Each "recipe" shows you a way to detect and def... [Read More]

    • ASIN: 1118362187
    • ASIN: 1118362187
    • ISBN: 9781118362181
    • Brand: Brand: Wiley
    • Manufacturer: Wiley

  • The Tangled Web: A Guide to Securing Modern Web Applications

    "Thorough and comprehensive coverage from one of the foremost experts in browser security." --Tavis Ormandy, Google Inc.Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrativ... [Read More]

    • ASIN: 1593273886
    • ASIN: 1593273886
    • ISBN: 1593273886
    • Manufacturer: No Starch Press

  • ModSecurity Handbook: The Complete Guide to the Popular Open Source Web Application Firewall

    Please note that this book was last updated in April 2012, even though the ISBN number and the publication date remain the same as for the first edition.ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack.Situated between your web sites and the world, web application firewalls provide an additional security layer, monitoring everything that comes i... [Read More]

    • ASIN: 1907117024
    • ASIN: 1907117024
    • ISBN: 1907117024
    • Brand: Brand: Feisty Duck Limited
    • Manufacturer: Feisty Duck Limited

  • The Best of 2600: A Hacker Odyssey

    Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine’s writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker’s perspective. Included are stories about the creation of the infamous tone dialer “red box” that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

    • ASIN: 0470294191
    • ASIN: 0470294191
    • ISBN: 0470294191
    • Manufacturer: Wiley

  • Guide to Network Defense and Countermeasures

    GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on ... [Read More]

    • ASIN: 1133727948
    • ASIN: 1133727948
    • ISBN: 1133727948
    • Brand: Brand: Cengage Learning
    • Manufacturer: Cengage Learning

  • Guide to Network Security

    GUIDE TO NETWORK SECURITY is a wide-ranging new text that provides a detailed review of the network security field, including essential terminology, the history of the discipline, and practical techniques to manage implementation of network security solutions. It begins with an overview of information, network, and web security, emphasizing the role of data communications and encryption. The authors then explore network perimeter defense technologies and methods, including access controls, firewalls, VPNs, and intrusion detection systems, as well as applied cryptography in public key infrastru... [Read More]

    • ASIN: 0840024223
    • ASIN: 0840024223
    • ISBN: 0840024223
    • Manufacturer: Cengage Learning

  • Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

    Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.Key defensive techniques are integrated throughout the exposition. You will develop situat... [Read More]

    • ASIN: 1484204581
    • ASIN: 1484204581
    • ISBN: 1484204581
    • Manufacturer: Apress

  • BSD Hacks

    In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks... [Read More]

    • ASIN: 0596006799
    • ASIN: 0596006799
    • ISBN: 0596006799
    • Brand: Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • Computer Security Literacy: Staying Safe in a Digital World

    Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform). Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practical security topics that users are likely to encounter on a regular basis. Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the function and impact of security in everyday life. T... [Read More]

    • ASIN: 1439856184
    • ASIN: 1439856184
    • ISBN: 1439856184
    • Manufacturer: Chapman and Hall/CRC

  • Juniper Networks Secure Access SSL VPN Configuration Guide

    Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.Complete coverage of the Juniper Networks Secure Access SSL VPN line inclu... [Read More]

    • ASIN: 1597492000
    • ASIN: 1597492000
    • ISBN: 1597492000
    • Manufacturer: Syngress

  • Hacking Exposed: Malware & Rootkits Secrets & Solutions

    "A harrowing guide to where the bad guys hide, and how you can find them." --Dan Kaminsky, Director of Penetration Testing, IOActive "An amazing resource. It is timely, focused, and what we need to better understand and defend against one of the greatest cyber threats we face." --From the Foreword by Lance Spitzner, President of the Honeynet Project Don't let another machine become a zombie in the malware armyDefend against the ongoing wave of malware and rootkit assaults the failsafe Hacking Exposed way. Real-world case studies and examples reveal how today's hackers use readily available too... [Read More]

    • ASIN: 0071591184
    • ASIN: 0071591184
    • ISBN: 0071591184
    • Manufacturer: McGraw-Hill Education

  • CEH Certified Ethical Hacker All-in-One Exam Guide

    Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL EXAM TOPICS, INCLUDING: Introduction to ethical hacking Cryptography Reconnaissance and foot... [Read More]

    • ASIN: 0071772294
    • ASIN: 0071772294
    • ISBN: 0071772294
    • Manufacturer: McGraw-Hill Osborne Media

  • IMPERVA SF-WAF-X651-SL2 - X6510 Web Application Firewall SoftwareLicense, Annual Premium Support

    X6510 Web Application Firewall SoftwareLicense, Annual Premium Support

    • ASIN: B07TYKGL2F
    • UPC: 190801074543
    • ASIN: B07TYKGL2F
    • Brand: IMPERVA
    • Manufacturer: IMPERVA

  • The Hacker's Handbook: The Strategy Behind Breaking Into and Defending Networks

    The Hacker’s Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intru... [Read More]

    • ASIN: 0849308887
    • ASIN: 0849308887
    • ISBN: 9780849308888
    • Brand: Brand: Auerbach Publications
    • Manufacturer: Auerbach Publications

  • Microsoft® ForefrontTM Threat Management Gateway (TMG) Administrator's Companion (Pro -Administrator's Campanion)

    Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft® Forefront® Threat Management Gateway (TMG). You'll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results. Discover how to: Implement TMG integrated security features Analyze your Web and perimeter security requirements and infrastructure Plan, install, and configure TMG Implement network intrusion preven... [Read More]

    • ASIN: 0735626383
    • UPC: 790145263834
    • ASIN: 0735626383
    • ISBN: 0735626383
    • Manufacturer: Microsoft Press

  • Microsoft Visual Basic 2017 for Windows, Web, and Database Applications: Comprehensive

    Prepare for the number one job in today's tech sector -- app development -- as you learn the essentials of Microsoft Visual Basic. The step-by-step, visual approach and professional programming opportunities in MICROSOFT VISUAL BASIC

    • UPC: 55480648

  • The Web Application Hacker's Handbook : Finding and Exploiting Security Flaws

    The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise

    • UPC: 16658186

  • Programming Collective Intelligence : Building Smart Web 2.0 Applications

    This book introduces Web developers to the advanced topic of machine learning and statistics in a clear and concise way, with easy-to-follow examples and code that can be used in their own

    • UPC: 5797695
    • Rating: 4.0

  • Beginning Django : Web Application Development and Deployment with Python

    Discover the Django web application framework and get started building Python-based web applications. This book takes you from the basics of Django all the way through to cutting-edge topics such as creating RESTful applications. Beginning

    • UPC: 811394030

  • Building Web Applications with Visual Studio 2017 : Using .Net Core and Modern JavaScript Frameworks

    "Learn how to build web applications from three Microsoft MVPs. You will be able to compare and contrast several frameworks and select the best one for your needs. With the release of .NET Core and

    • UPC: 56074951

  • Microsoft Visual Basic 2015 for Windows, Web, Windows Store, and Database Applications

    9781285856896

    • UPC: 46129955

  • Complete Bootstrap : Responsive Web Development with Bootstrap 4: Learn All the New Features and Build a Set of Example Applications for Your Portfolio with the Latest Version of Bootstrap

    Complete Bootstrap: Responsive Web Development with Bootstrap 4: Learn All the New Features and Build a Set of Example Applications for Your Portfolio with the Latest Version of

    • UPC: 436898094

  • Web Application Firewall Assurance - eBook

    Nowadays web application firewalls are capable of identifying and neutralizing sophisticated threats. They employ the finest methods of machine learning and decision making algorithms. As a result, more and more companies purchase and deploy them

    • UPC: 909841283

  • Web Content Management : Systems, Features, and Best Practices

    "Looking to select a web content management system (CMS), but confused about the promises, terminology, and buzzwords? Do you want to understand content management without having to dive into the underlying programming? This book provides

    • UPC: 44979023

  • Serverless Web Applications with React and Firebase

    Serverless Web Applications with React and

    • UPC: 367685579

  • 3 Best Web Application Firewall (WAF) for 2018

    What is a Web Application Firewall (WAF)?

    The AWS Web Application Firewall (WAF)