Flylib.com
Part V: Appendixes
Previous page
Table of content
Next page
IN THIS PART
A
Hex to Decimal Conversion Table
B
WEPCrack Exploit Code Example
C
References
Previous page
Table of content
Next page
Maximum Wireless Security
ISBN: 0672324881
EAN: 2147483647
Year: 2002
Pages: 171
Authors:
Cyrus Peikari
,
Seth Fogie
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Employ Iterative, Feature-Based Delivery
Phase: Envision
Practice: Product Architecture
Practice: Customer Team-Developer Team Interface
Practice: Release, Milestone, and Iteration Plan
Inside Network Security Assessment: Guarding Your IT Infrastructure
Understanding the Attacker
How to Respond to an Attack
Vulnerability Management
Appendix C. Security Assessment Sample Report
Recommendations
SQL Tips & Techniques (Miscellaneous)
Using Data Control Language (DCL) to Setup Database Security
Using Keys and Constraints to Maintain Database Integrity
Retrieving and Manipulating Data Through Cursors
Exploiting MS-SQL Server Built-in Stored Procedures
Working with SQL Database Data Across the Internet
Mapping Hacks: Tips & Tools for Electronic Cartography
Hacks 14-21
Hacks 35-46
Hack 46. Map Global Weather Conditions
Hack 92. Map Wardriving (and other!) Data with MapServer
Hack 93. Node Runner
Ruby Cookbook (Cookbooks (OReilly))
Numbers
Summing the Items of an Array
Controlling Access by Making Methods Private
Automatically Running Unit Tests
Using Java Libraries with JRuby
Programming .Net Windows Applications
Overview
Text
Date and Time Controls
Creating Custom Controls from Scratch
Debugging in Visual Studio .NET
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies