PHP and MySQL® Web Development, Fourth Edition
by Luke Welling; Laura Thomson
Essential PHP Security
by Chris Shiflett
Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
by Michael Hale Ligh; Steven Adair; Blake Hartstein; Matthew Richard
Social Engineering: The Art of Human Hacking
by Christopher Hadnagy
Hacking: The Art of Exploitation, 2nd Edition
by Jon Erickson
The Art of Deception: Controlling the Human Element of Security
by Kevin D. Mitnick; William L. Simon; Steve Wozniak
Pro Drupal Development, Second Edition
by John K. VanDyk
Security Strategies in Web Applications and Social Networking provides a unique, in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by an industry expert, this book provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the Internet. Using examples and exercises, this book incorporates hands-on activities to prepare readers to successfully secure Web-enabled applications.
This textbook is accompanied by a comprehensive supplements package, including all of the following: Instructor Resource Guide organized by learning objectives, with lesson plans, test questions, and Powerpoint presentation slides; lab simulations and lab manuals (labs available at additional cost), and online courseware compatible with your LMS.
About the Series
This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking—putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.
Average Rating: Based on 0 Ratings
No Subscribers have provided a review for this book. Be the first to create a review.
Top Level Categories:
Information Technology & Software Development
Sub-Categories:
Information Technology & Software Development > Networking
Networking > Security
Some information on this page was provided using data from Amazon.com®. View at Amazon >
From this page, you can view, sort, and delete the Bookmarks you have created.
You do not currently have any bookmarks.
Use the text entry field above to search inside this title. Click the SEARCH button to initiate the search. Sort the search results by relevancy or by the sequence in which they occur in the title. Click the result link to view the result within the title.
No search results.
On this page, you can view, filter, sort, edit, delete, and print all of the Notes for this title and Tags you have created.
You do not currently have any notes.