Security strategies in web applications & social networking
Saved in:
| Format: | Book |
|---|---|
| Language: | English |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Web mining and social networking
Security and privacy in social networks
Published: (2013)
Published: (2013)
Network and application security fundamentals and practices
by: Ganguly, Debashis
Published: (2012)
by: Ganguly, Debashis
Published: (2012)
Web security for network and system administrators
by: Mackey, David
Published: (2003)
by: Mackey, David
Published: (2003)
Web applications
by: Knuckles
Published: (2005)
by: Knuckles
Published: (2005)
Business web strategy design, alignment and application /
Published: (2009)
Published: (2009)
Security strategies in linux platforms and applications
Building secure and reliable networks applications
by: Birman
Published: (1996)
by: Birman
Published: (1996)
Network Strategy
Developing Web applications
by: Moseley, Ralph
Published: (2007)
by: Moseley, Ralph
Published: (2007)
Web application development
by: Foo
Published: (2000)
by: Foo
Published: (2000)
Social network analysis
Published: (2008)
Published: (2008)
Social Media security leveraging social networking while mitigating
by: Cross, Michael 1965-
Published: (2013)
by: Cross, Michael 1965-
Published: (2013)
Web security a whitehat perspective
by: Hanqing, Wu, et al.
Published: (2015)
by: Hanqing, Wu, et al.
Published: (2015)
Web security sourcebook
by: Rubin
Published: (1997)
by: Rubin
Published: (1997)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd
Published: (2011)
by: Stuttard, Dafydd
Published: (2011)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
The web application hacker's handbook discovering and exploiting security flaws
by: Stuttard, Dafydd
Published: (2008)
by: Stuttard, Dafydd
Published: (2008)
Network security essentials applications and standards
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Network security essentials applications and standards
by: Stallings, William
Published: (2007)
by: Stallings, William
Published: (2007)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Network security essentials Applications and standards
by: StallingslhWilliam
by: StallingslhWilliam
Web application vunerabilities Detect, exploit,prevent
by: Palmer
Published: (2007)
by: Palmer
Published: (2007)
Web application design patterns
by: Vora, Pawan
Published: (2009)
by: Vora, Pawan
Published: (2009)
An introduction to databases with web application
by: Prigmor
Published: (2008)
by: Prigmor
Published: (2008)
Network analysis with applications
by: Stanley, William D.
Published: (1997)
by: Stanley, William D.
Published: (1997)
Network analysis with applications
by: Stanley, William D.
Published: (2003)
by: Stanley, William D.
Published: (2003)
Network analysis with applications
by: Stanley
Published: (2000)
by: Stanley
Published: (2000)
Neural networks and their application
Web-based network management beyond the browser
by: HarlerlhCurt
by: HarlerlhCurt
Social security false consciousness and crisis
by: Attarian
Published: (2002)
by: Attarian
Published: (2002)
Cyber security and network security.
by: Guha, A., Samanta, D., Vinay, M., & Pramanik, S. (2022)
by: Guha, A., Samanta, D., Vinay, M., & Pramanik, S. (2022)
Social networking in recruiment build your social networking expertise to give yourself a cost-effective advantage in the hiring market
by: Belton, Amanda
Published: (2014)
by: Belton, Amanda
Published: (2014)
SECURITY TESTING MODEL FOR DETECTING SQL INJECTION VULNERABILITY IN WEB APPLICATION /
by: Nor Fatimah Awang
by: Nor Fatimah Awang
Network security know it all
Published: (2008)
Published: (2008)
Breakthrough perspectives in network and data communications security, design, and applications
Published: (2009)
Published: (2009)
Network security an introduction to techniques and standard
by: Kamruzaman Seman
by: Kamruzaman Seman
Network security how to plan for it and achieve it
by: Baker
Published: (1995)
by: Baker
Published: (1995)
Network security How to plan for it and achieve it
by: BakerlhRichard H.
by: BakerlhRichard H.
Similar Items
- Web mining and social networking
-
Security and privacy in social networks
Published: (2013) -
Network and application security fundamentals and practices
by: Ganguly, Debashis
Published: (2012) -
Web security for network and system administrators
by: Mackey, David
Published: (2003) -
Web applications
by: Knuckles
Published: (2005)


