下载  >  开发技术  >  Web开发  > Securing Ajax Applications

Securing Ajax Applications 评分

file format:pdf date:July 2007: First Edition. language:en

...展开详情
所需积分/C币:3 上传时间:2009-06-09 资源大小:2.54MB
举报 举报 收藏 收藏
分享 分享
Securing Ajax Application

Securing Ajax Application 很好的 AJAX 安全方面的书!

立即下载
Securing Ajax Applications

file format:pdf date:July 2007: First Edition. language:en

立即下载
Securing Ajax Applications Ensuring the Safety of the Dynamic Web.pdf

Securing Ajax Applications Ensuring the Safety of the Dynamic Web.pdf

立即下载
Securing Hadoop

教你如何搭建安全的Hadoop的相关策略及其他安全问题

立即下载
Securing REST WebServices

Securing REST WebServices with Spring Security and Custom HTTP Request Factories

立即下载
Securing_DevOps

PART 1: CASE STUDY: APPLYING LAYERS OF SECURITY TO A SIMPLE DEVOPS PIPELINE 2 Building a barebones DevOps pipeline to secure 3 Security layer 1: protecting web applications 4 Security layer 2: protecting cloud infrastructures 5 Security layer 3: securing communications 6 Security layer 4: securing t

立即下载
Securing the Barn

OJ题,有关搜索算法的一道经典的题,算法通过组合数输出的思想一样

立即下载
Securing Microservice APIs

There are several techniques for controlling access to web APIs in microservice architectures, ranging from network controls to cryptographic methods and platform-based capabilities. This short ebook introduces an API access control model that you can implement on a single platform or across multipl

立即下载
Securing_IPSAN

security on IPSAN (iSCSI)

立即下载
Securing And Optimizing Linux

Securing And Optimizing Linux

立即下载
Securing Docker.pdf

Securing Docker.pdf

立即下载
Hacking and Securing Ios Applications

Jonathan Zdziarski作品 Hacking and Securing Ios Applications电子书

立即下载
Hacking and Securing iOS Applications

Chapter 1. Everything You Know Is Wrong Part I: Hacking Chapter 2. The Basics of Compromising iOS Chapter 3. Stealing the Filesystem Chapter 4. Forensic Trace and Data Leakage Chapter 5. Defeating Encryption Chapter 6. Unobliterating Files Chapter 7. Manipulating the Runtime Chapter 8. Abusing the R

立即下载
Securing.Docker.1785888854

Key Features Gain confidence in using Docker for containerization without compromising on security This book covers different techniques to help you develop your container security skills It is loaded with practical examples and real-world scenarios to secure your container-based applications Book D

立即下载
Securing DevOps--2018

Securing DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. By the end of this book, readers will be ready to build security controls at all layers, monitor and respond to attacks on cloud services, and add security organization-wide th

立即下载
Securing PHP Apps pdf 0分

Securing PHP Apps 英文版

立即下载
思科PPT:Securing Web Applications

思科PPT:Securing Web Applications 目录:  Secure Data Center Transformation  Application Security Trends and Concerns  Web Application Attack  Introducing Cisco Web Application Firewall WAF  Q&A

立即下载
Securing PHP Web Applications.pdf

Contents Acknowledgments xiii About the Authors xv Part I Web Development Is a Blood Sport—Don't Wander onto the Field Without a Helmet 1 Chapter 1 Security Is a Server Issue and Other Myths 3 Reality Check 3 Security Is a Server Issue 5 Hackers Gain Control Through Insecure Applications 5 Programm

立即下载
ModbusTCP/RTU网关设计

基于UIP协议栈,实现MODBUS联网,可参考本文档资料,有MODBUS协议介绍

立即下载
html+css+js制作的一个动态的新年贺卡

该代码是http://blog.csdn.net/qq_29656961/article/details/78155792博客里面的代码,代码里面有要用到的图片资源和音乐资源。

立即下载