Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Serverless Web Applications with React and Firebase: Develop real-time applications for web and mobile platforms
Serverless Web Applications with React and Firebase: Develop real-time applications for web and mobile platforms

Build rich and collaborative applications using client-side code with React, Redux, and Firebase

Key Features

  • A practical guide covering the full stack for web development with React 16 and Firebase
  • Leverage the power of Firebase Cloud Storage, messaging, functions, OAuth,...
Modern C++: Efficient and Scalable Application Development: Leverage the modern features of C++ to overcome difficulties in various stages of application development
Modern C++: Efficient and Scalable Application Development: Leverage the modern features of C++ to overcome difficulties in various stages of application development

Create apps in C++ and leverage its latest features using modern programming techniques.

Key Features

  • Develop strong C++ skills to build a variety of applications
  • Explore features of C++17, such as containers, algorithms, and threads
  • Grasp the standard...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

Get certified as an Azure architect by acing the 70-535 Architecting Microsoft Solutions (70-535) exam using this comprehensive guide with full coverage of the exam objectives

Key Features

  • Learn to successfully design and architect powerful solutions on the Azure Cloud platform
  • ...
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition
Windows Server 2019 Automation with PowerShell Cookbook: Powerful ways to automate and manage Windows administrative tasks, 3rd Edition

A practical guide to Windows Server 2019 and PowerShell

Key Features

  • Use PowerShell to effectively configure and administer Windows Server 2019
  • Improve the performance of new features such as DevOps and containers using PowerShell
  • Enhance PowerShell's...
The Modern C++ Challenge: Become an expert programmer by solving real-world problems
The Modern C++ Challenge: Become an expert programmer by solving real-world problems

Test your C++ programming skills by solving real-world programming problems covered in the book

Key Features

  • Solve a variety of real-world programming and logic problems by leveraging the power of C++17
  • Test your skills in using language features, algorithms, data...
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names
Managing Mission - Critical Domains and DNS: Demystifying nameservers, DNS, and domain names

This book will give you an all encompassing view of the domain name ecosystem combined with a comprehensive set of operations strategies.

Key Features

  • Manage infrastructure, risk, and management of DNS name servers. Get hands-on with factors like types of name servers, DNS queries and and...
OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications
OpenCV 3 Computer Vision with Python Cookbook: Leverage the power of OpenCV 3 and Python to build computer vision applications

Recipe-based approach to tackle the most common problems in Computer Vision by leveraging the functionality of OpenCV using Python APIs

Key Features

  • Build computer vision applications with OpenCV functionality via Python API
  • Get to grips with image processing, multiple...
Tkinter GUI Application Development Cookbook: A practical solution to your GUI development problems with Python and Tkinter
Tkinter GUI Application Development Cookbook: A practical solution to your GUI development problems with Python and Tkinter

Discover solutions to all your Tkinter and Python GUI development problems

Key Features

  • Integrate efficient Python GUI programming techniques with Tkinter
  • Efficiently implement advanced MVC architectures in your Python GUI apps
  • Solve all your problems...
Mastering Exploratory Analysis with pandas: Build an end-to-end data analysis workflow with Python
Mastering Exploratory Analysis with pandas: Build an end-to-end data analysis workflow with Python

Explore Python frameworks like pandas, Jupyter notebooks, and Matplotlib to build data pipelines and data visualization

Key Features

  • Learn to set up data analysis pipelines with pandas and Jupyter notebooks
  • Effective techniques for data selection, manipulation, and...
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python

Leverage the simplicity of Python and available libraries to build web security testing tools for your application

Key Features

  • Understand the web application penetration testing methodology and toolkit using Python
  • Write a web crawler/spider with the Scrapy library
  • ...
Result Page: Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy