75% of attacks targeted against specific systems are aimed against the web application itself; not the operating system or network. …
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, …
The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written …
Although Ruby is an easy language to learn, in the heat of action you may find that you can't remember …
An arsenal of inside information on CISSP and how to master the certification test!More and more frequently, corporations are requiring …
This third edition of Sybex's in-depth Study Guide to the "must have" international security certification, CISSP, provides updated coverage of …
IT security skills are in high demand, and the CISSP Study Guide can give you the skills you need to …
This second edition of Sybex's in-depth Study Guide to the leading security certification, CISSP, includes expanded coverage of the latest …
* This updated bestseller features new, more focused review material for the leading computer security certification-the Certified Information Systems Security …
Building on the popular Sybex Study Guide approach, CISSP: Certified Information Systems Security Professional Study Guide, 4th Edition provides 100% …
With the growing threat of computer viruses and Internet security breaches, companies are fiercely headhunting for CISSP certified security professionals. …
All-in-One is All You NeedFully revised for the latest exam release, this authoritative volume offers thorough coverage of all the …
Biology is a science full of terms and concepts that range from the hard-to-imagine, such as the structure of an …
Intends to bring out some of the most important concepts associates with the theoretical aspects. This book can help the …
Welcome to ChatGPT for Dummies! This book is a comprehensive guide to understanding and using ChatGPT, one of the most …
Unlock the Power of Text Analysis and Machine Learning with "Natural Language Processing with Python" In a world awash with …
This book offers Python programmers one place to look when they need help remembering or deciphering the syntax of this …
Useful in many roles, from design and prototyping to testing, deployment, and maintenance, Python is consistently ranked among today’s most …
This book offers Python programmers one place to look when they needhelp remembering or deciphering the syntax of this open …
Are you looking to master Python programming without getting lost in endless documentation and tutorials? Look no further! "Python in …
This tutorial offers readers a thorough introduction to programming in Python 2.4, the portable, interpreted, object-oriented programming language that combines …
The Python Developer's Handbook is designed to expose experienced developers to Python and its uses. Beginning with a brief introduction …
Data is getting bigger and more complex by the day, and so are the choices in handling that data. As …
Data is getting bigger and more complex by the day, and so are your choices in handling it. Explore some …
Get to grips with the essentials of deep learning by leveraging the power of PythonKey FeaturesYour one-stop solution to get …
Do you want to write beautiful, structured, and maintainable JavaScript by applying modern design patterns to the language? Do you …
no details at all it is very shallow. after reading it I didn't feel that I got any worthwhile knowledge.
Learn the art of writing effective AI prompts and break into an exciting new career field Unlock the full power …
Visual Basic is Microsoft's premier programming language, used by more than three million developers and in 50 million Windows applicationsProgramming …
Over 700 pages of insight into all things cybersecurityCybersecurity All-in-One For Dummies covers a lot of ground in the world …
* Organized into eight task-oriented minibooks, this comprehensive 816-page guide shows beginning-to-intermediate users how to get up and running with …
Provides just what administrators need to configure, manage, maintain, and upgrade a Red Hat Enterprise Linux (RHEL) system Red Hat …
Install SUSE Linux and take advantage of cool new tools Use OpenOffice.org, go online with Firefox?, set up a wireless …
This easy-to-understand book for beginning SUSE Linux users starts off with step-by-step installation instructions and a discussion of what happens …
Everything gives me the impression it's like they polished up the/a RHEL3 book. But it's done a very poor way. …
Complete Guide to CISMR Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, …
The Certified Information Security Manager®(CISM®) certification program was developed by the Information Systems Audit and Controls Association (ISACA®). It has …