ModSecurity 2.5

ModSecurity 2.5
Author :
Publisher : Packt Publishing Ltd
Total Pages : 416
Release :
ISBN-10 : 9781847194756
ISBN-13 : 1847194753
Rating : 4/5 (753 Downloads)

Book Synopsis ModSecurity 2.5 by : Magnus Mischel

Download or read book ModSecurity 2.5 written by Magnus Mischel and published by Packt Publishing Ltd. This book was released on 2009-11-23 with total page 416 pages. Available in PDF, EPUB and Kindle. Book excerpt: Prevent web application hacking with this easy to use guide.


ModSecurity 2.5 Related Books

Modsecurity Handbook
Language: en
Pages: 365
Authors: Ivan Ristic
Categories: Computers
Type: BOOK - Published: 2010 - Publisher: Feisty Duck

DOWNLOAD EBOOK

"ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristić, who designed and wrote mu
ModSecurity 2.5
Language: en
Pages: 416
Authors: Magnus Mischel
Categories: Computers
Type: BOOK - Published: 2009-11-23 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Prevent web application hacking with this easy to use guide.
Moodle 4 Security
Language: en
Pages: 288
Authors: Ian Wild
Categories: Computers
Type: BOOK - Published: 2024-03-08 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniques Key Features Demonstrate the security of
Security and Privacy - Silver Linings in the Cloud
Language: en
Pages: 329
Authors: Kai Rannenberg
Categories: Computers
Type: BOOK - Published: 2010-08-07 - Publisher: Springer

DOWNLOAD EBOOK

These proceedings contain the papers of IFIP/SEC 2010. It was a special honour and privilege to chair the Program Committee and prepare the proceedings for this
Implementing Enterprise Cybersecurity with Opensource Software and Standard Architecture
Language: en
Pages: 278
Authors: Anand Handa
Categories: Science
Type: BOOK - Published: 2022-09-01 - Publisher: CRC Press

DOWNLOAD EBOOK

Many small and medium scale businesses cannot afford to procure expensive cybersecurity tools. In many cases, even after procurement, lack of a workforce with k