Related Books
Language: en
Pages: 291
Pages: 291
Type: BOOK - Published: 2010-12-10 - Publisher: Elsevier
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed h
Language: en
Pages: 188
Pages: 188
Type: BOOK - Published: 2011-01-13 - Publisher: Elsevier
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed h
Language: en
Pages: 137
Pages: 137
Type: BOOK - Published: 2015-09-04 - Publisher: MIT Press
How we can evade, protest, and sabotage today's pervasive digital surveillance by deploying more data, not less—and why we should. With Obfuscation, Finn Brun
Language: en
Pages: 770
Pages: 770
Type: BOOK - Published: 2011-03-16 - Publisher: John Wiley & Sons
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-w
Language: en
Pages: 939
Pages: 939
Type: BOOK - Published: 2009-07-24 - Publisher: Pearson Education
“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, an