Showing 1 - 20 results of 20 for search '"operating system"', query time: 0.04s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Mac security bible by Kissell, Joe

    Published 2010
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 8

    Mac security bible by Kissell, Joe

    Published 2010
    Subjects:
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    SQL injection attacks and defense by Clarke, Justin

    Published 2012
    Table of Contents: “…-- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 16

    SQL injection attacks and defense by Clarke, Justin

    Published 2012
    Table of Contents: “…-- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  17. 17

    Hacking for dummies by Beaver, Kevin

    Published 2013
    Table of Contents: “…Hacking network hosts -- pt. IV. Hacking operating systems -- pt. V. Hacking applications -- pt. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 18

    Hacking for dummies by Beaver, Kevin

    Published 2013
    Table of Contents: “…Hacking network hosts -- pt. IV. Hacking operating systems -- pt. V. Hacking applications -- pt. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 19

    Cloud computing security foundations and challenges /

    Published 2021
    Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook
  20. 20

    Cloud computing security foundations and challenges /

    Published 2021
    Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
    Taylor & Francis
    OCLC metadata license agreement
    Electronic eBook