Login       My Wishlist
  My Cart
$0.00 / 0 items
Translate This Website
International Translation Network
International Access
Global Shipping Options Available
  Our Catalog   Computers & Technology   Security & Encryption

Security & Encryption - 157 - Page 2 - Blowout Sale! Save up to 77%

Blowout Sale! Up to 77% off on Security & Encryption at Translate This Website, Page 2. Top brands include CreateSpace Independent Publishing Platform, Addison-Wesley Professional, Independently published, Seitz, Justin, Al Sweigart, Auerbach Publications, O Reilly Media, Packt Publishing - ebooks Account, Cyber Punk Architects, Manning Publications, No Starch Press, O'Reilly Media, McGraw-Hill Education, Syngress, Packt Publishing, Springer, & Opentask. Hurry! Limited time offers. Offers valid only while supplies last.

Hacking Made Easy 1 (Volume 1)
By CreateSpace Independent Publishing Platform
In Stock

ean: 9781537234366, isbn: 1537234366,

4.1 out of 5 stars with 12 reviews
NEW RELEASE!! Coming Soon - Other Books In This Series Hacking Made Easy 2, Python Made Easy 1 Interested In Learning How To Hack But Don’t Know How To Begin? Hacking Made Easy 1 would guide you through the process of hacking with some practical applications and prepare you for the 2nd book ''Hacking Made Easy 2'' Where you will learn extremely useful hacking techniques such as how to hack a Facebook Account, Wifi Password & even how to safeguard your very own WordPress site which a very

The CERT C Secure Coding Standard
By Addison-Wesley Professional
In Stock
You Save: 19%

mpn: Illustrations, ean: 9780321563217, isbn: 0321563212,

4.2 out of 5 stars with 28 reviews
“I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CERT® C Secure Coding Standard fills this need.” –Randy Meyers, Chairman of ANSI C “For years we have relied upon the CERT/CC to publish advisories documenting an endless stream of security problems. Now CERT has embodied

By Independently published
In Stock

ean: 9781973212836, isbn: 1973212838,

4.2 out of 5 stars with 51 reviews
Are you preparing for technical interviews? Do you know the number one cause of people failing to crack interviews is lack of preparation?Though coding is still the major part of technical interviews, companies these days are including atleast one system design question to check the expertise of the candidate in designing large scale systems. For example :- careers page of facebook clearly mentions there will be one round of system design interview. Sample questions will be like ''Design

Gray Hat Python: Python Programming for Hackers and Reverse Engineers
By Seitz, Justin
In Stock

mpn: 43171-611276, ean: 9781593271923, isbn: 1593271921,

4.5 out of 5 stars with 154 reviews
Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools

Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
By Al Sweigart
In Stock

ean: 9781482614374, isbn: 1482614375,

4.8 out of 5 stars with 275 reviews
* * * This is the old edition! The new edition is under the title ''Cracking Codes with Python'' by Al Sweigart * * * Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that can break the encrypted messages from these ciphers. Unfortunately, the programs in this book won’t get the reader in trouble with the law (or rather, fortunately) but it is

Secure and Resilient Software Development
By Auerbach Publications
In Stock
You Save: 18%

ean: 9781439826966, isbn: 9781439826966,

4.9 out of 5 stars with 124 reviews
Although many software books highlight open problems in secure software development, few provide easily actionable, ground-level solutions. Breaking the mold, Secure and Resilient Software Development teaches you how to apply best practices and standards for consistent and secure software development. It details specific quality software development strategies and practices that stress resilience requirements with precise, actionable, and ground-level inputs. Providing comprehensive coverage,

Hackers & Painters: Big Ideas from the Computer Age
By O Reilly Media
In Stock
You Save: 41%

mpn: 978-1-4493-8955-0, ean: 9781449389550, isbn: 1449389554,

4.2 out of 5 stars with 43 reviews
''The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. '' --from Hackers & Painters: Big Ideas from the Computer Age, by Paul GrahamWe are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?Consider these facts:

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
By Packt Publishing - ebooks Account
In Stock

ean: 9781789344202, isbn: 1789344204,

4.5 out of 5 stars with 96 reviews
Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book Description Bug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively―and profitably―participating in bug bounty

The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems (2nd Edition) (SEI Series in Software Engineering)
By Addison-Wesley Professional
In Stock
You Save: 19%

ean: 9780321984043, isbn: 9780321984043,

4.5 out of 5 stars with 120 reviews
“At Cisco, we have adopted the CERT C Coding Standard as the internal secure coding standard for all C developers. It is a core component of our secure development lifecycle. The coding standard described in this book breaks down complex software security topics into easy-to-follow rules with excellent real-world examples. It is an essential reference for any developer who wishes to write secure and resilient software in C and C++.” —Edward D. Paradise, vice president, engineering, threat

The All In One Computer Programming Bible: Beginner to Intermediate Guides on Python, Computer Programming, Raspberry Pi and Black Hat Hacking!
By Cyber Punk Architects
In Stock
4.7 out of 5 stars with 49 reviews
Do you want to learn and start programming within 24 hours? Learning to write computer programs can be fun if you take up the right approach, and this is the objective of this book. This book provides a simple, easy-to-follow, and practically sound approach to computer programming. These are topics many programming guides don't cover, as they are assumed to be general knowledge to most developers. That is why this guide has been created. It is the ultimate primer to all programming

Spring in Action: Covers Spring 4
By Manning Publications
In Stock
You Save: 43%

mpn: 43168-30087, ean: 9781617291203, isbn: 161729120X,

4.0 out of 5 stars with 158 reviews
SummarySpring in Action, Fourth Edition is a hands-on guide to the Spring Framework, updated for version 4. It covers the latest features, tools, and practices including Spring MVC, REST, Security, Web Flow, and more. You'll move between short snippets and an ongoing example as you learn to build simple and efficient J2EE applications. Author Craig Walls has a special knack for crisp and entertaining examples that zoom in on the features and techniques you really need.Purchase of the print book

Serious Python: Black-Belt Advice on Deployment, Scalability, Testing, and More
By No Starch Press
In Stock
You Save: 36%

ean: 9781593278786, isbn: 1593278780,

4.4 out of 5 stars with 181 reviews
An indispensable collection of practical tips and real-world advice for tackling common Python problems and taking your code to the next level. Features interviews with high-profile Python developers who share their tips, tricks, best practices, and real-world advice gleaned from years of experience.The Hacker's Guide to Python will teach you how to fine tune your Python code and give you a deeper understanding of how the language works under the hood. This essential guide distills years of

Modern PHP: New Features and Good Practices
By O'Reilly Media
In Stock
You Save: 34%

mpn: black & white illustrations, ean: 9781491905012, isbn: 1491905018,

4.8 out of 5 stars with 131 reviews
PHP is experiencing a renaissance, though it may be difficult to tell with all of the outdated PHP tutorials online. With this practical guide, you’ll learn how PHP has become a full-featured, mature language with object-orientation, namespaces, and a growing collection of reusable component libraries.Author Josh Lockhart—creator of PHP The Right Way, a popular initiative to encourage PHP best practices—reveals these new language features in action. You’ll learn best practices for

OAuth 2 in Action
By Manning Publications
In Stock
You Save: 24%

mpn: 44801221, ean: 9781617293276, isbn: 161729327X,

4.2 out of 5 stars with 216 reviews
Summary OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the Technology Think of OAuth 2 as the web version of a valet key. It is an

Oracle Fusion Developer Guide: Building Rich Internet Applications with Oracle ADF Business Components and Oracle ADF Faces (Oracle Press)
By McGraw-Hill Education
In Stock
You Save: 77%

ean: 9780071622547, isbn: 9780071622547,

4.1 out of 5 stars with 177 reviews
Master Oracle Fusion Middleware Successfully design rich enterprise web applications using the detailed information in this Oracle Press volume. Oracle Fusion Developer Guide goes beyond the predominant drag-and-drop methods in Oracle JDeveloper 11g and provides a wealth of examples that address common development scenarios when using Oracle Fusion Middleware. Work with Oracle JDeveloper 11g, define navigation rules, accept and validate user input, build page layouts and skins, and incorporate

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
By Syngress
In Stock
You Save: 26%

mpn: 36161995, ean: 9781597499576, isbn: 1597499579,

4.8 out of 5 stars with 286 reviews
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using

Learn Red – Fundamentals of Red: Get up and running with the Red language for full-stack development
By Packt Publishing
In Stock

ean: 9781789130706, isbn: 1789130700,

4.7 out of 5 stars with 9 reviews
Discover how to use the next-generation language Red for full-stack development, from systems coding over user-interfaces to blockchain programmingKey FeaturesExplore the latest features of Red to build scalable, fast, and secure applicationsLearn graphical programming and build highly sophisticated reactive applicationsGet familiar with the specific concepts and techniques of Red development, like working with series, viewing code as data, and using dialects.Book DescriptionA key problem of

Human Language Technology. Challenges for Computer Science and Linguistics: 7th Language and Technology Conference, LTC 2015, Poznań, Poland, November ... Papers (Lecture Notes in Computer Science)
By Springer
In Stock
You Save: 8%

ean: 9783319937816, isbn: 3319937812,

4.6 out of 5 stars with 164 reviews
This book constitutes the refereed proceedings of the 8th Language and Technology Conference: Challenges for Computer Science and Linguistics, LTC 2017, held in Poznan, Poland, in November 2017. The 31 revised papers presented in this volume were carefully reviewed and selected from 108 submissions. The papers selected to this volume belong to various fields of:  Speech Processing; Multiword Expressions; Parsing; Language Resources and Tools; Ontologies and Wordnets; Machine Translation;

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
By No Starch Press
In Stock
You Save: 50%

mpn: 48227133, ean: 9781593278229, isbn: 1593278225,

4.6 out of 5 stars with 269 reviews
Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère cipher. You’ll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today’s online

Pattern-Oriented Memory Forensics: A Pattern Language Approach
By Opentask
In Stock
You Save: 47%

mpn: colour illustrations, ean: 9781908043764, isbn: 1908043768,

4.1 out of 5 stars with 24 reviews
This is a full-color transcript of a lecture which introduces a pattern language for memory forensics - investigation of past software behaviour in memory snapshots. It provides a unified language for discussing and communicating detection and analysis results despite the proliferation of operating systems and tools, a base language for checklists, and an aid in accelerated learning. The lecture has a short theoretical part and then illustrates various patterns seen in crash dumps by using

Viewing Page 2 of 4

View more products in Computers & Technology.
Feel free to Browse Our Catalog.

Privacy Policy / Terms of Service / Accessibility Statement
© 2020 - translateth.is. All Rights Reserved.