-
Web Mapping Illustrated
Oreilly & 出版With the help of the Internet and accompanying tools, creating and publishing online maps has becom
-
I-Mode Developer’s Guide
Users of this book will be able to quickly and efficiently build I-Mode pages using their most fami
-
Web Services Platform Architecture
Pearson 出版A guide to Web services covers such topics as service orientation, UDDI, transactions, security, BP
-
The Art Of Intrusion
Ingram 出版Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Dec
-
Linux Server Security
Oreilly & 出版Linux consistently appears high up in the list of popular Internet servers, whether it's for the We
-
-
Flash Math Creativity
Ingram 出版The seminal book, Flash Math Creativity, completely revised for Flash MX 2004 and ActionScript 2.0!
-
-
-
Small Web Sites, Great Results
The goal of this book is to serve as a design/idea book. Our mantra is that simplicity leads to gre
-
Brute Force
Ingram 出版In the 1960s, it became increasingly clear that more and more information was going to be stored on
-
Build Your Own Database Driven Website Using PHP & MySQL
Sitepoint 出版Build Your Own Database-Driven Website Using PHP & MySQL is a practical guide for first-time users
-
-
Beginning Visual Web Programming with C#
Apress 出版With this book you'll learn the fundamentals of the web environment and how Visual Studio .NET make
-
Routing First-step
Ingram 出版Your first step into the world of routing No routing experience required Includes clear and easily
-
Keep Your Kids Safe On The Internet
McGraw-Hill 出版Aims to help you protect your children from dangers that lurk on the Internet. This title enables y
-
Pro.Net 1.1 Network Programming
Apress 出版Networking is one of the core tasks of enterprise-level programming, and for the programmer familia
-
Web Search Garage
Enter your Web Search Garagewhere you learn how to look, what to useto find magicfind it fasterwith
-
Wi-Foo
Addison-Wesl 出版A guide to penetrating and defending wireless networks, and to hacking wireless networks. It helps
-
Windows Forensics And Incident Recovery
Provides a 'command-line centric' view of Microsoft and non-Microsoft tools that can be very helpfu
-
Know Your Enemy
Very few organizations today know who their enemy is or how they might attack; when they might atta
-
Constructing Usable Shopping Carts
Apress 出版Creating a usable e-commerce application is a daunting challenge. There is so much to do, from the
-
-
Computer Networking First-Step
Ingram 出版Your first step into the world of computer networking No experience required Includes clear and e
-
-
Essential Php Tools
Apress 出版PHP Toolbox explains how to use popular PEAR modules and PHP add-ons to simplify your XML processin
-
Security Warrior
Oreilly & 出版When it comes to network security, many users and administrators are running scared, and justifiabl
-
-
-
UNIX Network Programming, Vol. 1
Addison-Wesl 出版This is THE guide to UNIX network programming APIs. Whether you write Web servers, client/server ap
-
Semantic Web
Learn what the Semantic Web is expected to be and how a variety of technologies must play together
-
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Addison-Wesl 出版Providing descriptions of security techniques, this title presents significant clarification of IEE
-
Sams Teach Yourself Web Services in 24 Hours
According to recent press reports, everyone is developing Web Services but many are still in the ex
-
-
Intrusion Detection with Snort
Sams 出版With over 100,000 installations, the Snort open-source network intrusion detection system is combin
-
Stealing the Network: How to Own the Box
Elsevier Sci 出版Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troub
-
-
-
Web Hacking
Addison-Wesl 出版Whether it's petty defacing or full-scale cyber-robbery, hackers are moving to the web along with e
-
Understanding Web Services
A guide to exactly how web services work, this text reviews each key standard for enabling web serv
-
-
Computer Forensics
Every computer crime leaves tracks--you just have to know where to find them. This book shows you h
-
Web Caching
On the World Wide Web, speed and efficiency are vital. Users have little patience for slow web page
-
-
Implementing Elliptic Curve Cryptography
Manning 出版How to develop cryptosystems that utilize minimal resources to get maximum security.
-
7天上手!駭客特訓班-使用TryHackMe
★★★☆☆碁峰資訊 出版新手入門!TryHackMe實戰演練,親身體驗攻擊手法與漏洞分析! 隨著網路攻擊事件日益增多,即使不是資安專家,IT工程師也越來越需要了解網路安全。 但資安術語與概念單靠紙上學習難以掌握,最有效的方
-
駭客的Linux基礎入門必修課(第二版)
★★★☆☆碁峰資訊 出版想要成為駭客嗎?你的起點就在這裡! 如果你打算踏上駭客攻擊、資訊安全,與滲透測試這條令人興奮的旅途,這是絕佳的入門書。你將使用Kali Linux這套專為數位鑑識與滲透測試而設計的作業系統來學習Li
-