Buy gisd.eu ?

Products related to Web:


  • Grokking Web Application Security
    Grokking Web Application Security

    When you launch an application on the web, every hacker in the world has access to it.Are you sure your web apps can stand up to the most sophisticated attacks?Grokking Web Application Security is a brilliantly illustrated and clearly written guide that delivers detailed coverage on: How the browser security model works, including sandboxing, the same-origin policy, and methods of securing cookiesSecuring web servers with input validation, escaping of output, and defense in depthA development process that prevents security bugsProtecting yourself from browser vulnerabilities such as cross-site scripting, cross-site request forgery, and clickjackingNetwork vulnerabilities like man-in-the-middle attacks, SSL-stripping, and DNS poisoningPreventing authentication vulnerabilities that allow brute forcing of credentials by using single sign-on or multi-factor authenticationAuthorization vulnerabilities like broken access control and session jackingHow to use encryption in web applicationsInjection attacks, command execution attacks, and remote code execution attacksMalicious payloads that can be used to attack XML parsers, and file upload functions

    Price: 69.99 £ | Shipping*: 0.00 £
  • Web Security For Developers
    Web Security For Developers

    Every website today is vulnerable to attack and a compromised website can ruin a company's reputation.Web Security Basics for Developers covers everything a web developer needs to know about web security.Readers will learn who attackers are and what they have at their disposal, how the Internet and websites operate, and various ways websites get attacked.Author Malcolm McDonald explores common attacks like SQL injection and cross-site scripting, as well as common vulnerabilities like information leakage, offering real-world examples and code samples.

    Price: 28.99 £ | Shipping*: 0.00 £
  • Web Application Security : Exploitation and Countermeasures for Modern Web Applications
    Web Application Security : Exploitation and Countermeasures for Modern Web Applications

    In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of application security: reconnaissance, offense, and defense.In this revised and updated second edition, he examines dozens of related topics, from the latest types of attacks and mitigations to threat modeling, the secure software development lifecycle (SSDL/SDLC), and more. Hoffman, senior staff security engineer at Ripple, also provides information regarding exploits and mitigations for several additional web application technologies such as GraphQL, cloud-based deployments, content delivery networks (CDN) and server-side rendering (SSR).Following the curriculum from the first book, this second edition is split into three distinct pillars comprising three separate skill sets:Pillar 1: Recon-Learn techniques for mapping and documenting web applications remotely, including procedures for working with web applicationsPillar 2: Offense-Explore methods for attacking web applications using a number of highly effective exploits that have been proven by the best hackers in the world.These skills are valuable when used alongside the skills from Pillar 3. Pillar 3: Defense-Build on skills acquired in the first two parts to construct effective and long-lived mitigations for each of the attacks described in Pillar 2.

    Price: 52.99 £ | Shipping*: 0.00 £
  • Web Scraping with Python : Data Extraction from the Modern Web
    Web Scraping with Python : Data Extraction from the Modern Web

    If programming is magic, then web scraping is surely a form of wizardry.By writing a simple automated program, you can query web servers, request data, and parse it to extract the information you need.This thoroughly updated third edition not only introduces you to web scraping but also serves as a comprehensive guide to scraping almost every type of data from the modern web. Part I focuses on web scraping mechanics: using Python to request information from a web server, performing basic handling of the server's response, and interacting with sites in an automated fashion.Part II explores a variety of more specific tools and applications to fit any web scraping scenario you're likely to encounter. Parse complicated HTML pagesDevelop crawlers with the Scrapy frameworkLearn methods to store the data you scrapeRead and extract data from documentsClean and normalize badly formatted dataRead and write natural languagesCrawl through forms and loginsScrape JavaScript and crawl through APIsUse and write image-to-text softwareAvoid scraping traps and bot blockersUse scrapers to test your website

    Price: 52.99 £ | Shipping*: 0.00 £
  • Practical Cryptology and Web Security
    Practical Cryptology and Web Security

    Security is now the number one concern for businesses world wide.The gold standard for attaining security is cryptography; it provides the most reliable tools for storing or transmitting digital information. This is the first textbook showing students how to implement cryptography and incorporate it into real-world systems on the Web.

    Price: 56.99 £ | Shipping*: 0.00 £
  • Data Fabric Architectures : Web-Driven Applications
    Data Fabric Architectures : Web-Driven Applications

    The immense increase on the size and type of real time data generated across various edge computing platform results in unstructured databases and data silos.This edited book gathers together an international set of researchers to investigate the possibilities offered by data-fabric solutions; the volume focuses in particular on data architectures and on semantic changes in future data landscapes.

    Price: 140.00 £ | Shipping*: 0.00 £
  • Internet Strategy : The Road to Web Services Solutions
    Internet Strategy : The Road to Web Services Solutions

    Internet Strategy: The Road to Web Services Solutions reminds readers that several attempts have been made to convince the world that DOT.COM was developed to take over businesses, and the traditional way of creating businesses and running organizations would be condemned to the past.One of those attempts led to the Application Service Provision model, from which the current Web Services business model takes its origins.As organizations start to carefully invest again, ""Internet Strategy: The Road to Web Services Solutions"" shows that the focus is on delivering value and enabling growth.The book concentrates on how to create, execute and evolve a customer-centric strategy of any Internet-based management strategy in order to provide valuable customer experiences. ""Internet Strategy: The Road to Web Services Solutions"" presents how enabling technologies are as important as ever.It points out that there's a need to move to new levels in thinking and execution, to help organizations maintain cost efficiencies and enable growth in revenues and profitability.

    Price: 89.95 £ | Shipping*: 0.00 £
  • Web
    Web

    Desperate to do better at school, Tim becomes entangled in a web of lies in this thought-provoking drama, edited to a reading age of 6.5. Tim is terrible at French, so when his football coach Max offers to help with his homework he's thrilled.He knows it's wrong, but his marks are so much better he pushes that out of his mind.When Max starts charging for his help, Tim gets entangled in a web of lies and doesn't know if he will ever escape.

    Price: 7.99 £ | Shipping*: 3.99 £

Similar search terms for Web:


  • What is the connection between web design and web development?

    Web design and web development are closely related disciplines that work together to create functional and visually appealing websites. Web design focuses on the aesthetics and user experience of a website, including layout, color scheme, and typography. Web development, on the other hand, involves the technical aspects of building a website, such as coding, programming, and implementing functionality. Both web design and web development are essential for creating a successful website that engages users and meets their needs.

  • Which providers offer web hosting backup solutions?

    There are several web hosting providers that offer backup solutions, including Bluehost, SiteGround, HostGator, and InMotion Hosting. These providers offer various backup options such as automatic daily backups, on-demand backups, and the ability to restore your website from a backup with just a few clicks. It's important to choose a web hosting provider that offers reliable backup solutions to ensure the security and integrity of your website's data.

  • Which printers have communication problems with HP Web Jetadmin?

    Some HP printers may experience communication problems with HP Web Jetadmin, particularly if they are older models or if the firmware is not up to date. Additionally, certain network configurations or security settings may also cause communication issues. It's important to ensure that the printers are compatible with the version of HP Web Jetadmin being used and that the necessary ports and protocols are open for communication. Regularly updating the printer firmware and HP Web Jetadmin software can also help to prevent communication problems.

  • How can a web server receive text data?

    A web server can receive text data through a variety of methods. One common way is through the use of HTML forms, where users can input text into fields and submit the form to the server. The server can also receive text data through HTTP requests, such as POST requests, where the text data is included in the body of the request. Additionally, web servers can receive text data through APIs or other communication protocols that allow for the transfer of text data between the client and the server.

  • What are secret data in the Dark Web?

    Secret data in the Dark Web refers to any confidential or sensitive information that is not meant to be publicly accessible. This can include personal data such as social security numbers, credit card information, or medical records, as well as proprietary information such as trade secrets or intellectual property. This data is often bought and sold on the Dark Web by cybercriminals for various illegal activities such as identity theft, fraud, or espionage. Accessing and trading in secret data is a major concern for law enforcement and cybersecurity professionals.

  • Windows or macOS for web design/web development?

    Both Windows and macOS are viable options for web design and development. Windows is known for its compatibility with a wide range of software and hardware, making it a popular choice for developers. On the other hand, macOS is preferred by many designers for its sleek interface and seamless integration with other Apple products. Ultimately, the choice between Windows and macOS comes down to personal preference and the specific tools and software you prefer to use for your web design and development projects.

  • What distinguishes the Dark web from the Deep web?

    The Dark web and the Deep web are often confused, but they are not the same. The Deep web refers to all parts of the internet that are not indexed by traditional search engines, such as private databases, password-protected websites, and other unindexed content. On the other hand, the Dark web is a small portion of the Deep web that is intentionally hidden and requires specific software, configurations, or authorization to access. The Dark web is often associated with illegal activities, black markets, and anonymity, making it a more secretive and potentially dangerous part of the internet.

  • What distinguishes the dark web from the deep web?

    The dark web is a small portion of the deep web that is intentionally hidden and requires specific software or authorization to access. It is often associated with illegal activities and anonymity. In contrast, the deep web refers to all parts of the internet that are not indexed by traditional search engines and includes legitimate content such as private databases, academic resources, and password-protected websites.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.