Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

Linux Web Server Development: A Step-by-Step Guide for Ubuntu, Fedora, and other Linux Distributions
Linux Web Server Development: A Step-by-Step Guide for Ubuntu, Fedora, and other Linux Distributions

Linux Web Server Development will teach you how to build a Linux Web server from scratch using Free/Open Source programs. The only requirement is a computer with an Internet connection. You will learn how to: • download and set up a Linux Web server • configure your router and Operating System • register and configure a Dynamic...

Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python
Hacking Secret Ciphers with Python: A beginner's guide to cryptography and computer programming with Python

* * * This is the old edition! The new edition is under the title "Cracking Codes with Python" by Al Sweigart * * *

Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that...

C in Depth :: Easy Beginner's To Expert's Guide.
C in Depth :: Easy Beginner's To Expert's Guide.

Essential C Skills-Made Easy–Without Fear!

This C Programming book gives a good start and complete introduction for C Programming for Beginner’s. Learn the all basics and advanced features of C programming in no time from Bestselling...

The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

C Programming - An Advanced Course
C Programming - An Advanced Course

This book takes up where C Programming - A Beginner's Course leaves off. It assumes you have a working knowledge of basic programming concepts such as variables, constants, assignment, selection (if..else) and looping (while, for). It also assumes you are comfortable with writing functions and working with arrays. If you are not, it is...

Algorithms For Interviews
Algorithms For Interviews

Algorithms for Interviews (AFI) aims to help engineers interviewing for software development positions. The primary focus of AFI is algorithm design. The entire book is presented through problems interspersed with discussions. The problems cover key concepts and are well-motivated, challenging, and fun to solve.

We do not
...

SEO 2017 Learn Search Engine Optimization With Smart Internet Marketing Strateg: Learn SEO with smart internet marketing strategies
SEO 2017 Learn Search Engine Optimization With Smart Internet Marketing Strateg: Learn SEO with smart internet marketing strategies

Most of the search engine optimization advice on the Internet is wrong!

If you've sifted through the torrents of search engine optimization advice online, you may have noticed two things:

- Most published SEO advice is either outdated or just dead-wrong.
- Google's constant updates have made many
...

Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)
Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)

Use This Information To Avoid Being Spied By The Government Today!

If you’ve ever heard outrageous stories about online illegal drug stores, hit men for hire, celebrities busted for child porn, mad scientific experiments, and Illuminati rituals, you’ve probably heard of the “dark web”, alternatively called...

SQL: Easy SQL Programming & Database Management For Beginners, Your Step-By-Step Guide To Learning The SQL Database (SQL Series)
SQL: Easy SQL Programming & Database Management For Beginners, Your Step-By-Step Guide To Learning The SQL Database (SQL Series)

What makes this book unique is how easy it makes it for you to learn. The author brings you a guide that takes you through a natural sequence of lessons, step-by-step, carefully explaining each concept and staying away from unnecessary technical jargon whilst defining the terms you need to learn. This one-step-at-a-time approach allows anyone...

Android from A to D
Android from A to D
At the time the previous edition of this book was published, there was only one way to install the Android Software Development Kit (SDK): the complicated way. Recently, though, Android has introduced the Android Developer Tools (ADT) Bundle which makes installing the SDK much easier. The ADT Bundle contains the latest Android Software...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy