Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Java EE 8 Cookbook: Build reliable applications with the most robust and mature technology for enterprise development
Java EE 8 Cookbook: Build reliable applications with the most robust and mature technology for enterprise development

A practical guide for building effective enterprise solutions with Java EE 8

Key Features

  • Recipes to get you up-and-running with Java EE 8 application development
  • Learn how to apply the major Java EE 8 APIs and specifications
  • Implement microservices and...
React 16 Tooling: Master essential cutting-edge tools, such as create-react-app, Jest, and Flow
React 16 Tooling: Master essential cutting-edge tools, such as create-react-app, Jest, and Flow

React 16 Tooling covers the most important tools, utilities, and libraries that every React developer needs to know - in detail.

Key Features

  • Each chapter presents meta-development solutions to help React developers
  • The tools used are presented in a practical,...
Mastering OpenCV 4 with Python: A practical guide covering topics from image processing, augmented reality to deep learning with OpenCV 4 and Python 3.7
Mastering OpenCV 4 with Python: A practical guide covering topics from image processing, augmented reality to deep learning with OpenCV 4 and Python 3.7

Create advanced applications with Python and OpenCV, exploring the potential of facial recognition, machine learning, deep learning, web computing and augmented reality.

Key Features

  • Develop your computer vision skills by mastering algorithms in Open Source Computer Vision 4 (OpenCV 4)and...
Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development
Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development

This book will teach the concepts of test driven development in Java so you can build clean, maintainable and robust code

Key Features

  • Explore the most popular TDD tools and frameworks and become more proficient in building applications
  • Create applications with better code...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Hands-On Functional Programming in Rust: Build modular and reactive applications with functional programming techniques in Rust 2018
Hands-On Functional Programming in Rust: Build modular and reactive applications with functional programming techniques in Rust 2018

Explore the support Rust offers for creating functional applications in Rust. Learn about various design patterns, implementing concurrency, metaprogramming, and so on in the process

Key Features

  • Learn generics, organization, and design patterns in functional programming
  • ...
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner

Build distributed applications that resolve data ownership issues when working with transactions between multiple parties

Key Features

  • Explore a perfect balance between theories and hands-on activities
  • Discover popular Blockchain use cases such as Bitcoin
  • ...
Hands-On Natural Language Processing with Python: A practical guide to applying deep learning architectures to your NLP applications
Hands-On Natural Language Processing with Python: A practical guide to applying deep learning architectures to your NLP applications

Foster your NLP applications with the help of deep learning, NLTK, and TensorFlow

Key Features

  • Weave neural networks into linguistic applications across various platforms
  • Perform NLP tasks and train its models using NLTK and TensorFlow
  • Boost your NLP...
Java EE 8 High Performance: Master techniques such as memory optimization, caching, concurrency, and multithreading to achieve maximum performance from your enterprise applications.
Java EE 8 High Performance: Master techniques such as memory optimization, caching, concurrency, and multithreading to achieve maximum performance from your enterprise applications.

Get more control of your applications performances in development and production and know how to meet your Service Level Agreement on critical microservices.

Key Features

  • Learn how to write a JavaEE application with performance constraints (Service Level Agreement?SLA) leveraging the...
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Result Page: 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy