Skip to main content


Technological Turf Wars

Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems articulated by computer antivirus industry professionals affect technological security.

Browser Security Whitepaper

This white paper provides a technical comparison of the security features and attack surface of Google Chrome, Microsoft Edge, and Internet Explorer. We aim to identify which browser provides the highest level of security in common enterprise usage scenarios, and show how differences in design and implementation of various security technologies in modern web browsers might affect their security. Comparisons are done using a qualitative approach since many issues regarding browser security cannot easily be quantified.

Learn to Hack RiSE- JavaScript, CSS & HTML

In this eBook ou will learn Front-End Developers HTML (Hyper Text Markup Language) JavaScript CSS (Cascading Style Sheets) Bridge between the designer and the back-end developers and programmers. Responsible for how people use the site and what they do with the site data Client-side scripts, not server-side programming. What is HTML, namely the language used by web browsers/clients to display web pages.

eCommerce In The Cloud

Is your eCommerce solution ready for the cloud? This practical guide shows experienced and aspiring web architects alike how to adopt cloud computing incrementally, using public Infrastructure-as-a-Service and Platform-as-a-Service. You will learn how to marshal as much capacity as you need to handle peak holiday or special-event traffic. This eBook helps architects leverage recent technological advances that have made it possible to run an entire enterprise-level eCommerce platform from a cloud.

Hack & HHVM Without Breaking Things

How can you take advantage of the HipHop Virtual Machine (HHVM) and the Hack programming language, two new technologies that Facebook developed to run their web servers? With this practical guide, Owen Yamauchi—a member of Facebook’s core Hack and HHVM teams—shows you how to get started with these battle-tested open-source tools. You’ll explore static typechecking and several other features that separate Hack from its PHP origins.

General VPN Setup Cisco

GA virtual private network is a network of virtual circuits that carry private traffic over a public network such as the Internet. VPNs can connect two or more LANS, or remote users to a LAN. VPNs provide privacy and security by requiring all users to authenticate and by encrypting all data traffic. Many network environments define HTTP proxies that connect a web browser to a particular network resource. The HTTP traffic can reach the network resource only if the proxy is specified in the browser and the client routes the HTTP traffic to the proxy.

HTML CSS Bootstrap Framework

A static website is a group of self-contained, individual pages (or page), sent to the browser from the server one-page-at-a-time. Dyamic web content is built when it is requested, by the user directly, or programmatically while a user is on a page (e.g., facebook updates). Client-side (front-end) coding includes HTML, CSS and Javascript. This just means that our code will be downloaded from the server and then compiled entirely in the browser. This eBook discusses all this and everything on othe other topics.