Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 10
- Computer security
- Security measures
- Application software 2
- COMPUTERS / Computer Graphics / Game Programming & Design 2
- COMPUTERS / Information Technology 2
- COMPUTERS / Security / General 2
- Cloud computing 2
- Computer hackers 2
- Data protection 2
- Information resources management 2
- Macintosh (Computer) 2
- Operating systems (Computers) 2
- Programming 2
- SQL (Computer program language) 2
-
1
Mac security bible
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Mac security bible
Published 2010Subjects: An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
SQL injection attacks and defense
Published 2012Table of Contents: “…-- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
SQL injection attacks and defense
Published 2012Table of Contents: “…-- Testing for SQL injection -- Reviewing code for SQL injection -- Exploiting SQL injection -- Blind SQL injection exploitation -- Exploiting the operating system -- Advanced topics -- Code-level defenses -- Platform level defenses -- Confirming and recovering from SQL injection attacks.…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
-
6
-
7
Hacking for dummies
Published 2013Table of Contents: “…Hacking network hosts -- pt. IV. Hacking operating systems -- pt. V. Hacking applications -- pt. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Hacking for dummies
Published 2013Table of Contents: “…Hacking network hosts -- pt. IV. Hacking operating systems -- pt. V. Hacking applications -- pt. …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
9
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook -
10
Cloud computing security foundations and challenges /
Published 2021Table of Contents: “…2.7 ITU-T Cloud Computing Reference Architecture -- 2.7.1 Cloud Computing Actors -- 2.7.2 Layered Architecture -- 2.7.3 ITU-T Cloud Computing Functional Reference Architecture -- 2.8 Network Requirements for Cloud Computing -- 2.9 Summary -- References -- Chapter 3 Cloud Security Baselines -- 3.1 Introduction -- 3.2 An Overview of Computer Security -- 3.3 Vulnerabilities and Attacks -- 3.3.1 Application Layer -- 3.3.2 Operating System Layer -- 3.3.3 Hypervisor, Storage, Hardware, and Network -- 3.3.4 Cloud Security Mechanisms -- 3.3.4.1 Data Security -- 3.3.4.2 Digital Signature…”
Taylor & Francis
OCLC metadata license agreement
Electronic eBook