自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(0)
  • 资源 (25)
  • 收藏
  • 关注

空空如也

the web application hacker's handbook

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.

2018-03-29

hacking exposed web applications

Implement bulletproof e-business security the proven Hacking Exposed way. Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, "Hacking Exposed Web Applications, Second Edition" shows you, step-by-step, how cyber-criminals target vulnerable sites, gain access, steal critical data, and execute devastating attacks. All of the cutting-edge threats and vulnerabilities are covered in full detail alongside real-world examples, case studies, and battle-tested countermeasures from the authors' experiences as gray hat security professionals.

2018-03-29

Hacking for dummies

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks. Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely Covers developing strategies for reporting vulnerabilities, managing security changes, and putting anti-hacking policies and procedures in place Completely updated to examine the latest hacks to Windows 7 and the newest version of Linux Explains ethical hacking and why it is essential "Hacking For Dummies, 3rd Edition" shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking.

2018-03-29

automata languages and programming

The two-volume set LNCS 5125 and LNCS 5126 constitutes the refereed proceedings of the 35th International Colloquium on Automata, Languages and Programming, ICALP 2008, held in Reykjavik, Iceland, in July 2008. The 126 revised full papers presented together with 4 invited lectures were carefully reviewed and selected from a total of 407 submissions. The papers are grouped in three major tracks on algorithms, automata, complexity and games, on logic, semantics, and theory of programming, and on security and cryptography foundations. LNCS 5126 contains 56 contributions of track B and track C selected from 208 submissions and 2 invited lectures. The papers for track B are organized in topical sections on bounds, distributed computation, real-time and probabilistic systems, logic and complexity, words and trees, nonstandard models of computation, reasoning about computation, and verification. The papers of track C cover topics in security and cryptography such as theory, secure computation, two-party protocols and zero-knowledge, encryption with special properties/quantum cryptography, various types of hashing, as well as public-key cryptography and authentication.

2018-03-29

foundations of xml processing

This is the first book that provides a solid theoretical account of the foundation of the popular data format XML. Part I establishes basic concepts, starting with schemas, tree automata and pattern matching, and concluding with static typechecking for XML as a highlight of the book. In Part II, the

2018-03-29

language and automata theory and applications

This book constitutes the refereed proceedings of the Second International Conference on Language and Automata Theory and Applications, LATA 2008, held in Tarragona, Spain, in March 2008. The 40 revised full papers presented were carefully reviewed and selected from 134 submissions. The papers deal with the various issues related to automata theory and formal languages.

2018-03-29

A first course in logic

The ability to reason and think in a logical manner forms the basis of learning for most mathematics, computer science, philosophy and logic students. Based on the author's teaching notes at the University of Maryland and aimed at a broad audience, this text covers the fundamental topics in classical logic in an extremely clear, thorough and accurate style that is accessible to all the above. Covering propositional logic, first-order logic, and second-order logic, as well as proof theory, computability theory, and model theory, the text also contains numerous carefully graded exercises and is ideal for a first or refresher course.

2018-03-29

search engine optimization for dummies

Written by Peter Kent, e-commerce consultant, popular speaker, and critically-acclaimed author, Search Engine Optimization For Dummies helps you build a search engine- friendly site (or fix an existing site) and build traffic, showing you how to: Use effective Web site structure and text, including filenames, directory structure, title tags, descriptive meta tags, keyword meta tags, and an HTML navigation system, Avoid things search engines avoid, such as frames, invisible navigation systems, including those created with Java applets, Java Scripts and Macromedia Flash, cluttered sites overloaded with HTML unrelated to content, and more Bulk up your site with content—original or recycled Use specialized search systems to attract valuable, highly targeted traffic Use link popularity to boost your position and your PageRank Complete with a tear-out cheat sheet and information about Web sites you may want to hit for even more information, Search Engine Optimization For Dummies will help you make the Web site hit list.

2018-03-29

backbone marionette js

If you want to build your site's frontend with the single-page application (SPA) model, this hands-on book shows you how to get the job done with Backbone.js. You'll learn how to create structured JavaScript applications, using Backbone's own flavor of model-view-controller (MVC) architecture. Start with the basics of MVC, SPA, and Backbone, then get your hands dirty building sample applications - a simple Todo list app, a RESTful book library app, and a modular app with Backbone and RequireJS. Author Addy Osmani, an engineer for Google's Chrome team, also demonstrates advanced uses of the framework. Learn how Backbone.js brings MVC benefits to the client-side Write code that can be easily read, structured, and extended Work with the Backbone.Marionette and Thorax extension frameworks Solve common problems you'll encounter when using Backbone.js Organize your code into modules with AMD and RequireJS Paginate data for your Collections with the Backbone.Paginator plugin Bootstrap a new Backbone.js application with boilerplate code Use Backbone with jQuery Mobile and resolve routing problems between the two Unit-test your Backbone apps with Jasmine, QUnit, and SinonJS

2018-03-29

architecture of open source applications v2

Architects look at thousands of buildings during their training, and study critiques of those buildings written by masters. In contrast, most software developers only ever get to know a handful of large programs well—usually programs they wrote themselves—and never study the great programs of history. As a result, they repeat one another's mistakes rather than building on one another's successes. Our goal is to change that. In these two books, the authors of four dozen open source applications explain how their software is structured, and why. What are each program's major components? How do they interact? And what did their builders learn during their development? In answering these questions, the contributors to these books provide unique insights into how they think. If you are a junior developer, and want to learn how your more experienced colleagues think, these books are the place to start. If you are an intermediate or senior developer, and want to see how your peers have solved hard design problems, these books can help you too.

2018-03-29

creating mobile apps with sencha touch2

Everyone has had the perfect idea for a mobile application. Creating Mobile Apps with Sencha Touch 2 can help you bring that idea to life by providing clear examples, in depth explanations, and walking step-by-step building 10 different Sencha Touch mobile applications. You can use these applications as a base for your own applications or leverage your new skills to create something truly unique.

2018-03-29

professional nodejs

Learn to build fast and scalable software in JavaScript with Node.js Node.js is a powerful and popular new framework for writing scalable network programs using JavaScript. This no nonsense book begins with an overview of Node.js and then quickly dives into the code, core concepts, and APIs. In-depth coverage pares down the essentials to cover debugging, unit testing,

2018-03-29

third party javascript

Third-Party JavaScript guides web developers through the complete development of a full-featured third-party JavaScript application. You'll learn dozens of techniques for developing widgets that collect data for analytics, provide helpful overlays and dialogs, or implement features like chat or commenting. The concepts and examples throughout this book represent the best practices for this emerging field, based on thousands of real-world dev hours and results from millions of users.

2018-03-29

Effective Javascript

It’s uncommon to have a programming language wonk who can speak in such comfortable and friendly language as David does. His walk through the syntax and semantics of JavaScript is both charming and hugely insightful; reminders of gotchas complement realistic use cases, paced at a comfortable curve. You’ll find when you finish the book that you’ve gained a strong and comprehensive sense of mastery

2018-03-29

The Basic of Plugin Development for IntelliJ IDEA

The Basics of Plugin Development for IntelliJ IDEA. Alexey Efimov 1 This article helps you to quickly understand the basics of plugin development for IntelliJIDEA in order to start writing your own plugins. It describes general plugin design principles, descriptor syntax, and publishing. It also contains a plugin example with step-by-stepinstructions on how to create it.

2018-03-29

Common Lisp the Language 2nd Edition

the Common Lisp Object System, with new features to support function overloading and object-oriented programming, plus complete technical specifications * Loops, a powerful control structure for multiple variables * Conditions, a generalization of the error signaling mechanism * Series and generators * Plus other subjects not part of the ANSI standards but of interest to professional programmers. Throughout, you'll find fresh examples, additional clarifications, warnings, and tips - all presented with the author's customary vigor and wit.

2018-03-29

Developing an AngularJS Edge

This book is intended for intermediate JavaScript programmers. No attempt has been made to explain the JavaScript syntax used (except in the cases where AngularJS may introduce a peculiarity), nor do we explain concepts such as closures, function chaining, callbacks, or other common patterns.

2018-03-29

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除