Mostrando 2,181 - 2,200 Resultados de 3,243 Para Buscar '"streaming"', tiempo de consulta: 0.11s Limitar resultados
  1. 2181
    por Liberty, Jesse
    Publicado 2001
    Tabla de Contenidos: “…Creating the Web Services Client -- Creating the Amazon proxy -- Creating the desktop application -- Displaying the Output -- Implementing the Grid -- Handling the RowDataBound Event -- Searching by Category -- Part III -- Assemblies and Versioning -- PE Files -- Metadata -- Security Boundary -- Manifests -- Multimodule Assemblies -- Building a Multimodule Assembly -- Testing the assembly -- Loading the assembly -- Private Assemblies -- Shared Assemblies -- The End of DLL Hell -- Versions -- Strong Names -- The Global Assembly Cache -- Building a Shared Assembly -- Step 1: Create a strong name -- Step 2: Put the shared assembly in the GAC -- Other Required Assemblies -- Attributes and Reflection -- Attributes -- Attributes -- Attribute targets -- Applying attributes -- Custom Attributes -- Declaring an attribute -- Naming an attribute -- Constructing an attribute -- Using an attribute -- Reflection -- Viewing Metadata -- Type Discovery -- Reflecting on a Type -- Finding all type members -- Finding type methods -- Finding particular type members -- Late Binding -- Marshaling and Remoting -- Application Domains -- Creating and Using App Domains -- Marshaling Across App Domain Boundaries -- Understanding marshaling with proxies -- Specifying the marshaling method -- Context -- Context-Bound and Context-Agile Objects -- Marshaling Across Context Boundaries -- Remoting -- Understanding Server Object Types -- Specifying a Server with an Interface -- Building a Server -- Building the Client -- Using SingleCall -- Understanding RegisterWellKnownServiceType -- Understanding Endpoints -- Threads and Synchronization -- Threads -- Starting Threads -- Joining Threads -- Blocking Threads with Sleep -- Killing Threads -- Synchronization -- Using Interlocked -- Using Locks -- Using Monitors -- Race Conditions and Deadlocks -- Race Conditions -- Deadlock -- Streams…”
    Libro electrónico
  2. 2182
    Publicado 2012
    Tabla de Contenidos: “…Chapter 12 Security Administration and Planning -- Understanding Security Policies -- Security Policy Characteristics -- Enforcing Security Policies -- Value of a Security Policy -- Understanding Code of Ethics -- Policy Awareness -- Updating Security Policies -- Understanding Business Continuity Plans -- Business Impact Analysis -- Disaster Recovery Plan -- Comparing a BCP and a DRP -- Alternate Locations -- Identifying Security Organizations -- NIST -- US-CERT -- CERT/CC -- Questions -- Answers -- Chapter 13 Legal Issues -- Exploring Computer Forensics -- First Responders and Preserving the Scene -- Three Phases of a Computer Forensics Investigation -- Forensic Evidence Guiding Principles -- Volatile Data -- Comparing Computer Abuse and Computer Crime -- Understanding Fraud and Embezzlement Crime -- Mandatory Vacations -- Job Rotation -- Understanding Privacy Issues -- European Directives -- California Supreme Court Rules That Zip Codes Are PII -- Connecticut's Public Act No. 08-167 -- Children's Online Privacy Protection -- California Online Privacy Protection Act of 2003 -- Questions -- Answers -- Chapter 14 Cryptography -- An Overview of Cryptography Concepts -- Enforcing Integrity with Hashing -- Hashing Algorithms Provide One-Way Encryption -- Hashing Algorithms -- Verifying a Hash -- Exploring Symmetric Encryption -- ROT13 -- Comparing Block and Stream Ciphers -- Advanced Encryption Standard -- Other Symmetric Encryption Algorithms -- Exploring Asymmetric Encryption -- Secure Sockets Layer -- Protecting E-mail with S/MIME -- Other Encryption Schemes -- Steganography -- IPsec -- Public Key Infrastructure -- Certificates -- Certification Authority -- Comparing Cryptanalysis Attacks -- Known Plaintext Attack -- Cipher Text Attack -- Questions -- Answers -- Appendix: About the CD -- Glossary -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K.…”
    Libro electrónico
  3. 2183
    por Saha, A.
    Publicado 2013
    Tabla de Contenidos: “…6.3 Syndrome Computation and Error Detection -- 6.4 Decoding -- 6.5 Cyclic Hamming Code -- 6.6 Shortened Cyclic Code -- 6.7 Golay Code -- 6.8 Error-trapping Decoding -- 6.8.1 Improved Error-trapping -- 6.9 Majority Logic Decoding -- 6.10 Cyclic Redundancy Check -- 6.11 Solved Problems -- Multiple Choice Questions -- Review Questions -- Chapter 7: BCH Codes -- 7.1 Introduction -- 7.2 Primitive Elements -- 7.3 Minimal Polynomials -- 7.4 Generator Polynomials -- 7.5 Decoding of BCH Codes -- 7.6 Implementation of Galois Field -- 7.7 Implementation of Error Correction -- 7.7.1 Syndrome Computation -- 7.7.2 Computation of Error Location Polynomial -- 7.8 Nonbinary BCH Codes -- 7.8.1 Reed-Solomon Code -- 7.9 Weight Distribution -- 7.10 Solved Problems -- Multiple Choice Questions -- Review Questions -- Chapter 8: Convolution Codes -- 8.1 Introduction -- 8.2 Tree and Trellis Codes -- 8.3 Encoding -- 8.4 Properties -- 8.4.1 Structural Properties -- 8.4.2 Distance Properties -- 8.5 Decoding -- 8.5.1 Threshold Decoding -- 8.5.2 Sequential Decoding -- 8.5.3 Viterbi Decoding -- 8.6 Construction -- 8.7 Implementation and Modification -- 8.8 Applications -- 8.9 Turbo Coding and Decoding -- 8.10 Interleaving Techniques: Block and Convolution -- 8.11 Coding and Interleaving Applied to CD Digital Audio System -- 8.11.1 CIRC Encoding and Decoding -- 8.11.2 Interpolation and Muting -- 8.12 Solved Problems -- Multiple Choice Questions -- Review Questions -- Part C: Cryptography -- Chapter 9: Cryptography -- 9.1 Introduction -- 9.2 Plain Text, Cipher Text, and Key -- 9.3 Substitution and Transposition -- 9.4 Encryption and Decryption -- 9.5 Symmetric-key Cryptography -- 9.5.1 Stream Ciphers and Block Ciphers -- 9.6 Data Encryption Standard -- 9.6.1 Basic Principle -- 9.6.2 Initial Permutation -- 9.6.3 Details of Single Round -- 9.6.4 Inverse Initial Permutation…”
    Libro electrónico
  4. 2184
    Publicado 2017
    Tabla de Contenidos: “…Java EE in the container -- Container orchestration frameworks -- Realizing container orchestration -- Java EE in orchestrated containers -- Connecting external services -- Configuring orchestrated applications -- 12-factor applications and Java EE -- Have one codebase tracked in revision control, many deploys -- Explicitly declare and isolate dependencies -- Store config in the environment -- Treat backing services as attached resources -- Strictly separate build and run stages -- Execute the app as one or more stateless processes -- Export services via port binding -- Scale out via the process model -- Maximize robustness with fast startup and graceful shutdown -- Keep development, staging, and production as similar as possible -- Treat logs as event streams -- Run admin/management tasks as one-off processes -- Cloud, Cloud native, and their benefits -- Cloud native -- Summary -- Chapter 6: Application Development Workflows -- Motivation and goals of productive development workflows -- Realizing development workflows -- Version control everything -- Building binaries -- Java artifacts -- Artifact versions -- Building containers -- Quality assurance -- Deployment -- Configuration -- Credentials -- Data migration -- Adding database structures -- Changing database structures -- Removing database structures -- Implementing migration -- Testing -- Build metadata -- Going to production -- Branching models -- Technology -- Pipeline-as-code -- Workflows with Java EE -- Continuous Delivery culture and team habits -- Responsibility -- Check in early and often -- Immediately fixing issues -- Visibility -- Improve continuously -- Summary -- Chapter 7: Testing -- The necessity of tests -- Requirements of well-crafted tests -- Predictability -- Isolation -- Reliability -- Fast execution -- Automation -- Maintainability -- What to test…”
    Libro electrónico
  5. 2185
    Publicado 2014
    Tabla de Contenidos: “…: Specifics -- A bit-shifting demo : Quick facts about shift registers ; Pinouts -- Background : bit streams : Modern applications -- Experiment 28 : The Ching thing -- Hexagrams : The display ; The straight and yarrow path ; The numbers ; Random sampling ; The look and feel ; The details ; Bars or LEDs ; Boarding the Ching thing ; Assembly and testing ; Ching usage -- Packaging -- Experiment 29 : Common sensors -- The little magnetic switch : Reed test ; How it works -- Level sensor : Fuel gauge ; Quick facts about reed switches ; Easy substitution ; Installing a reed switch -- Background : magnetic polarity : Magnetic types and sources ; Magnetic shapes ; Make even more : eddy currents -- Warning : magnetic hazards -- Experiment 30 : Hidden detectors -- Hall test : Applications -- Quick facts about hall sensors : Hall types ; Sensor ideas -- Make even more : miniature roll-the-ball game : Plastic bending ; Rolling-ball electronics -- Experiment 31 : Electronic optics -- Active light sensors : Warning : slow sensor death! …”
    Libro electrónico
  6. 2186
    Publicado 2010
    Tabla de Contenidos: “…Consider different ways of reading from a stream. -- Item 54. Open filehandles to and from strings. -- Item 55. …”
    Libro electrónico
  7. 2187
    Publicado 2023
    Tabla de Contenidos: “…General Reflection -- Focus of Improvement Work -- Learning Points -- Bibliography -- Chapter 5 Value Management -- Aims -- Introduction -- Development of Value Management -- Context -- Value Management -- Preparing the Service -- Identify the Existing Quality Improvement Capacity of the Organisation -- Understand Finance Team Capacity -- Assess Management Interest -- Review Strategic Alignment -- Look for the Right Fit for a First Adopter -- Preparing a Team -- Detailed Components of Value Management -- Box Score -- Pareto Analysis -- PDSA Cycles -- Visual Management Board -- Weekly Huddle -- Daily Management -- Conclusions -- Learning Points -- Acknowledgements -- Bibliography -- Chapter 6 Building a Model Value Stream for Older People Living with Frailty in Ireland -- Aims -- Introduction -- True North and Adopting Lean for Healthcare Transformation -- From Getting Started to System-Wide Implementation: Frailty Case Example -- Example of a Rapid Improvement Event at St Luke's: 'First 72 Hours ‒ Frailty Identification' -- Preparation -- Days One to Five -- Sustain and Standardise -- Learning and Reflections -- The Role of Leadership in Transformation -- Culture, Context, and Insights -- Pace and Scale -- Global Pandemic -- Conclusions -- Learning Points -- Acknowledgements -- Bibliography -- Chapter 7 Using Lean at Scale in Mental Health Service Provision -- Aims -- Introduction -- Lean in Psychiatry: Is That Possible? …”
    Libro electrónico
  8. 2188
    Publicado 2024
    Tabla de Contenidos: “…-- Building serverless architecture -- Considerations for serverless architecture -- Building stateless and stateful architectural designs -- Stateful architecture -- Stateless architecture -- Creating a microservice architecture -- Saga pattern -- Fan-out/fan-in pattern -- Service mesh pattern -- Reactive architecture -- Building queue-based architecture -- Queuing chain pattern -- Job observer pattern -- Pipes-and-Filters Architecture -- Creating Event-Driven Architecture -- Publisher/subscriber model -- Event stream model -- Backend for Frontend pattern -- Cloud-native architecture anti-patterns -- Single point of failure -- Manual scaling -- Tightly coupled services -- Ignoring security best practices -- Not monitoring or logging -- Ignoring network latency -- Lack of testing -- Over-optimization -- Not considering costs -- Summary -- Chapter 6: Performance Considerations -- Design principles for high-performance architecture -- Reducing latency -- Improving throughput -- Handling concurrency -- Applying caching…”
    Libro electrónico
  9. 2189
    Publicado 2023
    Tabla de Contenidos: “…-- Fundamentals -- Data life cycle -- Common challenges and solutions -- Introduction to exploring data in BigQuery -- Exploring data in the BigQuery SQL workspace -- Exploring schema and table structure -- Exploring data using SQL -- Exploring data using the bq command-line interface -- Exploring data with visualization tools -- Enhancing data exploration in BigQuery -- Advanced approaches -- Best practices -- Summary -- Chapter 4: Loading and Transforming Data -- Technical requirements -- Exploring data loading techniques -- Batch loading data -- Streaming ingestion of data -- Scheduled loading of data…”
    Libro electrónico
  10. 2190
    por OECD
    Publicado 2024
    Tabla de Contenidos: “…Legislation guiding the monitoring and evaluation of regional development in Croatia -- Notes -- 5 Regional development funding and financing -- Introduction -- Sources of regional development funding and financing in Croatia -- Croatia's performance on selected fiscal indicators -- Subnational governments continue to rely heavily on grants and subsidies, despite increasing tax revenue -- Cities and municipalities receive most of their transfers from EU funds -- Subnational tax autonomy has gradually increased in Croatia -- Driven by EU accession, subnational investment increased by 82.7% over the last decade -- Subnational governments have maintained sound fiscal health during crises thanks to national government support -- EU and national funding and financing mechanisms for regional development -- Integrated Territorial Investments -- National Recovery and Resilience Plan -- Regional development funding from the national government -- Funding for the operation of RDAs -- Financing options for regional development -- Public finance-related challenges to regional development in Croatia -- Making the most of EU funding for regional development -- An increasing use of EU funding may pose challenges for policy makers to effectively address local needs -- Resource disparities across cities and municipalities can affect equal access to EU funding opportunities -- Subnational governments should diversify their revenue streams -- Under certain conditions, subnational public-private partnerships could mobilise funding for regional development initiatives -- Ensuring that the recent PIT reforms do not exacerbate regional and local disparities -- The 2023 PIT reform could reduce city and municipal dependency on inter-governmental grants -- A race to lower PIT rates may widen fiscal gaps between cities and municipalities…”
    Libro electrónico
  11. 2191
    Publicado 2024
    Tabla de Contenidos: “…The Tee-Object command -- Formatting -- Formatting and exporting -- The Format-Table command -- The Format-List command -- Select-Object, Write-Host, and inline output -- Format-only properties -- Summary -- Chapter 5: Operators -- Precedence, grouping, and sub-expressions -- Operator precedence -- Grouping -- Sub-expression operator -- Array sub-expression operator -- Unary, binary, and ternary operators -- About the ternary operator -- Arithmetic operators -- Addition operator -- Subtraction operator -- Multiplication operator -- Division operator -- Remainder operator -- Increment and decrement operators -- Comparison operators -- eq and ne -- like and notlike -- Greater than and less than -- Case sensitivity -- Comparison operators and arrays -- Comparisons to null -- contains and in -- Regular expression-based operators -- match and notmatch -- replace -- split -- Logical operators -- and -- or -- not -- xor (eXclusive OR) -- Bitwise operators -- band (bitwise AND) -- bor (bitwise OR) -- bxor (bitwise eXclusive OR) -- bnot (bitwise NOT) -- shl and shr (shift left and right operators) -- Assignment operators -- Assign, add and assign, and subtract and assign -- Multiply and assign, divide and assign, and modulus and assign -- Statements can be assigned to a variable -- Assignment and other operators -- Type operators -- as -- is and isnot -- Redirection operators -- About Write-Host -- Redirection to a file -- PowerShell and default file encoding -- Redirecting streams to standard output -- Only stdout -- Redirection to null -- Other operators -- Comma -- Index -- Range -- Call -- Format -- join -- Null coalescing -- Null coalescing assignment -- Null conditional -- Pipeline chain -- Background -- Summary -- Chapter 6: Conditional Statements and Loops -- if, else, and elseif -- Assignment within if statements -- Implicit Boolean…”
    Libro electrónico
  12. 2192
    Publicado 2015
    “…This Oracle Press book covers: Why lambdas were needed, and how they will change Java programming Syntax of lambda expressions The basic operation of streams and pipelines Using collectors and reduction to end pipelines Creating streams Spliterators, the fork/join framework, and exceptions Examining stream performance with microbenchmarking API evolution using default methods…”
    Libro electrónico
  13. 2193
    Publicado 1972
    Libro
  14. 2194
    Publicado 2019
    Libro electrónico
  15. 2195
    Publicado 1997
    Libro
  16. 2196
    Publicado 2018
    Tabla de Contenidos: “…Resetting signals -- Listing traps -- Using traps inside a function -- Running scripts or processes even if the user logs out -- Creating dialog boxes with the dialog utility -- Creating a message box (msgbox) -- Creating a message box (msgbox) with a title -- The yes/no box (yesno) -- The input box (inputbox) -- The textbox (textbox) -- A password box -- The checklist box (checklist) -- The menu box (menu) -- The radiolist box (radiolist) -- The progress meter box (gauge) -- Summary -- Chapter 12: System Startup and Customizing a Linux System -- System startup, inittab, and run levels -- The kernel startup and init process -- Understanding run levels -- System initialization boot scripts -- User initialization scripts -- System-wide setting scripts -- User level settings - default files -- Summary -- Chapter 13: Pattern Matching and Regular Expressions with sed and awk -- The basics of regular expressions -- sed - non-interactive stream editor -- Understanding sed -- Addressing in sed -- How to modify a file with sed -- Printing - the p command -- Deleting - the d command -- Substitution - the s command -- Range of selected lines the comma -- Multiple edits - the e command -- Reading from files - the r command -- Writing to files - the w command -- Appending - the a command -- Inserting - the i command -- Changing - the c command -- Transform - the y command -- Quit - the q command -- Holding and getting - the h and g commands -- Holding and exchanging - the h and x commands -- sed scripting -- Using awk -- The meaning of awk -- Using awk -- Input from files -- Input from commands -- How awk works -- awk commands from within a file -- Records and fields -- Records -- The record separator -- The 0 variable -- The NR variable -- Fields -- Field separators -- The input field separator -- Patterns and actions -- Patterns -- Actions…”
    Libro electrónico
  17. 2197
    Publicado 2018
    Tabla de Contenidos: “…Lifecycle management -- vSphere products -- NSX -- vRealize products -- vRealize Operations Manager -- vRealize Log Insight -- vRealize Automation, VMware vRealize Business, and VMware vRealize Orchestrator -- Summary -- Chapter 3: Transforming a Data Center from Silos to Software-Defined Services -- Need for VMware in data center transformation -- Business requirements of customers -- Interoperability and integration -- Logical design -- Orchestrator topology choice -- Orchestrator server mode choice -- vRealize Orchestrator SDDC cluster choice -- Integrated architecture design model for private and public clouds -- Private cloud integrated architecture design with network and security -- Integrated architecture design for virtual machines and applications -- Consumption model of network services components -- Components and processes for logical switching -- vRealize Automation with logical switching consumption overview -- Introduction to DevOps and its benefits -- Building, deploying, and running services in an innovative way -- SDDC object life cycle -- vRealize code stream functionality -- Automating application release without manual intervention -- Advantages of DevOps -- Summary -- Chapter 4: Designing a Mixed Cloud Model with VMware -- Core elements of VMware's Cross-Cloud Architecture -- Cross-Cloud Services -- Choosing suitable applications to move in the cloud -- VMware Cloud on AWS -- Components/technologies used in VMware-AWS partnerships -- Migrating your existing applications to AWS -- Application migration phases with supporting tools -- Migration assessment -- Schema conversion -- Conversion of embedded SQL and application code -- Data migration -- Testing converted code -- Data replication -- Deployment to AWS and Go-Live -- Post-deployment monitoring -- Managing AWS with vCenter -- Managing administrators on the management portal…”
    Libro electrónico
  18. 2198
    Publicado 2017
    Tabla de Contenidos: “…-- Retaining a Relationship with Your Employer Inretirement: An Innovative and Caring Plan Sponsor -- Mutual Benefits: Retaining Retiree Assets May Help Both Retirees and Plan Sponsors -- Turning DC Assets into a Lifetime Paycheck: Evaluating the DC Investment Lineup for Retiree Readiness -- Evaluating Portfolio Longevity -- Turning Defined Contribution Assets into a Lifetime Income Stream: How to Evaluate Investment Choices for Retirees -- Guarding Retiree Assets against a Sudden Market Downturn: Sequencing Risk -- Ways to Manage Market and Longevity Risk . . . without Adding In-Plan Insurance Products -- Living beyond 100: Planning for Longevity -- Managing Longevity Risk: Considerations for Buying an Annuity -- Immediate and Deferred Annuities: Why Out-of-Plan Makes Sense -- In Closing -- Questions for Plan Fiduciaries -- Notes -- Chapter 11 A Global View: The Best Ideas from around the Globe for Improving Plan Design -- DC Plans: Becoming the Dominant Global Model -- Retirement Plan Coverage and Participation -- Investment Default and Growth of Target-Date Strategies -- Retirement Income: The Global Search for Solutions -- Defined Ambition in the Netherlands -- New Solutions in Australia and Beyond: Tontines and Group Self-Annuitization -- "Getting DC Right": Lessons Learned in Chapters 1 through 10 -- Chapter 1: DC Plans Today -- Chapter 2: Aligning DC Investment Design to Meet the PRICE of Retirement -- Chapter 3: Plan Investment Structure -- Chapter 4: Target Date Design and Approaches -- Chapter 5: Capital Preservation Strategies -- Chapter 6: Fixed Income Strategies -- Chapter 7: Designing Balanced DC Menus: Considering Equity Options -- Chapter 8: Inflation Protection -- Chapter 9: Additional Strategies and Alternatives: Seeking Diversification and Return…”
    Libro electrónico
  19. 2199
    Publicado 2018
    Tabla de Contenidos: “…Starting Nexpose -- Start a scan -- Exploitation -- Post-exploitation -- Infrastructure analysis -- Pillaging -- High-profile targets -- Data exfiltration -- Persistence -- Further penetration into infrastructure -- Cleanup -- Reporting -- Executive summary -- Technical report -- Penetration testing limitations and challenges -- Pentesting maturity and scoring model -- Realism -- Methodology -- Reporting -- Summary -- Chapter 2: Advanced Linux Exploitation -- Linux basics -- Linux commands -- Streams -- Redirection -- Linux directory structure -- Users and groups -- Permissions -- The chmod command -- The chown command -- The chroot command -- The power of the find command -- Jobs, cron, and crontab -- Security models -- Security controls -- Access control models -- Linux attack vectors -- Linux enumeration with LinEnum -- OS detection with Nmap -- Privilege escalation -- Linux privilege checker -- Linux kernel exploitation -- UserLand versus kernel land -- System calls -- Linux kernel subsystems -- Process -- Threads -- Security-Enhanced Linux -- Memory models and the address spaces -- Linux kernel vulnerabilities -- NULL pointer dereference -- Arbitrary kernel read/write -- Case study CVE-2016-2443 Qualcomm MSM debug fs kernel arbitrary write -- Memory corruption vulnerabilities -- Kernel stack vulnerabilities -- Kernel heap vulnerabilities -- Race conditions -- Logical and hardware-related bugs -- Case study CVE-2016-4484 - Cryptsetup Initrd root Shell -- Linux Exploit Suggester -- Buffer overflow prevention techniques -- Address space layout randomization -- Stack canaries -- Non-executable stack -- Linux return oriented programming -- Linux hardening -- Summary -- Chapter 3: Corporate Network and Database Exploitation -- Networking fundamentals -- Network topologies -- Bus topology -- Star topology -- Ring topology -- Tree topology…”
    Libro electrónico
  20. 2200
    Publicado 2018
    Tabla de Contenidos: “…Exploitation using Metasploit -- SQL injection -- An SQL primer -- The SELECT statement -- Vulnerable code -- SQL injection testing methodology -- Extracting data with SQL injection -- Getting basic environment information -- Blind SQL injection -- Automating exploitation -- sqlninja -- BBQSQL -- sqlmap -- Attack potential of the SQL injection flaw -- XML injection -- XPath injection -- XPath injection with XCat -- The XML External Entity injection -- The Entity Expansion attack -- NoSQL injection -- Testing for NoSQL injection -- Exploiting NoSQL injection -- Mitigation and prevention of injection vulnerabilities -- Summary -- Chapter 6: Finding and Exploiting Cross-Site Scripting (XSS) Vulnerabilities -- An overview of Cross-Site Scripting -- Persistent XSS -- Reflected XSS -- DOM-based XSS -- XSS using the POST method -- Exploiting Cross-Site Scripting -- Cookie stealing -- Website defacing -- Key loggers -- Taking control of the user's browser with BeEF-XSS -- Scanning for XSS flaws -- XSSer -- XSS-Sniper -- Preventing and mitigating Cross-Site Scripting -- Summary -- Chapter 7: Cross-Site Request Forgery, Identification, and Exploitation -- Testing for CSRF flaws -- Exploiting a CSRF flaw -- Exploiting CSRF in a POST request -- CSRF on web services -- Using Cross-Site Scripting to bypass CSRF protections -- Preventing CSRF -- Summary -- Chapter 8: Attacking Flaws in Cryptographic Implementations -- A cryptography primer -- Algorithms and modes -- Asymmetric encryption versus symmetric encryption -- Symmetric encryption algorithm -- Stream and block ciphers -- Initialization Vectors -- Block cipher modes -- Hashing functions -- Salt values -- Secure communication over SSL/TLS -- Secure communication in web applications -- TLS encryption process -- Identifying weak implementations of SSL/TLS -- The OpenSSL command-line tool -- SSLScan -- SSLyze…”
    Libro electrónico