Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

The Power of Persuasion: How We're Bought and Sold
The Power of Persuasion: How We're Bought and Sold

"An engaging, highly readable survey of the sophisticated methods of persuasion we encounter in various situations. From television to telemarketing and from self-deception to suicide cults, Levine takes a hard look at all the ways we attempt to persuade each other--and how and why they work (or don't). . . . The next time you wonder...

Professional PHP5 (Programmer to Programmer)
Professional PHP5 (Programmer to Programmer)
What is this book about?

With the release of PHP 5 and the Zend Engine 2, PHP finally graduates from it earliest days as a lightweight scripting syntax to an powerful object oriented programming language that can hold its own against the Java and .NET architectures that currently dominate corporate software development....

MySQL Troubleshooting: What To Do When Queries Don't Work
MySQL Troubleshooting: What To Do When Queries Don't Work

I have worked since May 2006 as a principal technical support engineer in the Bugs Verification Group of the MySQL Support Group for MySQL AB, then Sun, and finally Oracle. During my daily job, I often see users who are stuck with a problem and have no idea what to do next. Well-verified methods exist to find the cause of the problem...

Getting Started with Python for the Internet of Things: Leverage the full potential of Python to prototype and build IoT projects using the Raspberry Pi
Getting Started with Python for the Internet of Things: Leverage the full potential of Python to prototype and build IoT projects using the Raspberry Pi

Build clever, collaborative, and powerful automation systems with the Raspberry Pi and Python.

Key Features

  • Create your own Pi-Rover or Pi-Hexipod robots
  • Develop practical applications in Python using Raspberry Pi
  • Build your own Jarvis, a highly advanced...
Sensing, Intelligence, Motion : How Robots and Humans Move in an Unstructured World
Sensing, Intelligence, Motion : How Robots and Humans Move in an Unstructured World

A leap forward in the field of robotics

Until now, most of the advances in robotics have taken place in structured environments. Scientists and engineers have designed highly sophisticated robots, but most are still only able to operate and move in predetermined, planned environments designed specifically for the robots and
...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

E-learning Tools and Technologies: A consumer's guide for trainers, teachers, educators, and instructional designers
E-learning Tools and Technologies: A consumer's guide for trainers, teachers, educators, and instructional designers
A comprehensive guide to help you cut through the hype in order to select the best E-Learning tools and vendors for your specific needs

With its ability to both reduce operating costs and train more people, E-Learning is an attractive option for companies that are trying to balance business and educational goals. But in order to implement an...

Jakarta Pitfalls: Time-Saving Solutions for Struts, Ant, JUnit, and Cactus
Jakarta Pitfalls: Time-Saving Solutions for Struts, Ant, JUnit, and Cactus
Escape from common coding pitfalls with this detailed book of proven Jakarta missteps and solutions

The dangers of Jakarta pitfalls are everywhere and countless developers have already been trapped. These mistakes have delayed schedules, allowed major bugs to get into the users’ hands, or led to numerous rewrites in maintenance. Luckily,...

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys...

Computer Systems Architecture: a Networking Approach (2nd Edition)
Computer Systems Architecture: a Networking Approach (2nd Edition)

The new edition of Computer Systems Architecture has been brought up to date with extended descriptions of ARM and Itanium processors and an extended

introduction to the field of data communications.  Its established approach emphasizes that the vast majority of modern computers are not stand-alone devices, but cooperate...

Raspberry Pi Networking Cookbook
Raspberry Pi Networking Cookbook

Computer expert or enthusiast, this cookbook will help you use your Raspberry Pi to enhance your existing network. From sharing media across devices to deploying your own web portal, you'll be amazed at what can be achieved.

Overview

  • Learn how to install, administer, and maintain your...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy