Home | Amazing | Today | Tags | Publishers | Years | Search 
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity Study Guide: How to Build a Successful Cyberdefense Program Against Advanced Threats

Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Introduction to Deep Learning Business Applications for Developers: From Conversational Bots in Customer Service to Medical Image Processing
Introduction to Deep Learning Business Applications for Developers: From Conversational Bots in Customer Service to Medical Image Processing
Discover the potential applications, challenges, and opportunities of deep learning from a business perspective with technical examples. These applications include image recognition, segmentation and annotation, video processing and annotation, voice recognition, intelligent personal assistants, automated translation, and...
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Decision Trees for Business Intelligence and Data Mining: Using SAS Enterprise Miner
Decision Trees for Business Intelligence and Data Mining: Using SAS Enterprise Miner
Using SAS Enterprise Miner, Barry de Ville's Decision Trees for Business Intelligence and Data Mining illustrates the application and operation of decision trees in business intelligence, data mining, business analytics, prediction, and knowledge discovery. It explains in detail the use of decision trees as a data mining technique and...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Exploring Microsoft Office Access 2016 Comprehensive (Exploring for Office 2016 Series)
Exploring Microsoft Office Access 2016 Comprehensive (Exploring for Office 2016 Series)

This book offers full, comprehensive coverage of Microsoft Access.

 

Beyond point-and-click

The goal of the Exploring series is to move students beyond the point-and-click, to understanding the why and...

User-Centered Agile Method
User-Centered Agile Method

Agile development methods began to emerge around 20 years ago. However, it was not until the early 2000s that they began to be widely used in industry. This growth was often due to the advent of Internet services requiring faster cycles of development in order to heighten the rate at which an ever-greater number of functionalities...

Prehospital Trauma Care
Prehospital Trauma Care

Comprehensive in scope and content, Prehospital Trauma Care (PTC) covers all aspects of emergency medicine-triage assessment and treatment, anesthesia, intensive care, psychiatry, health and military disasters, burns, shock, and surgery.
Written by over 70 distinguished international experts representing Australia, Austria, Belgium,
...

Electric Machines: Steady State, Transients, and Design with MATLAB®
Electric Machines: Steady State, Transients, and Design with MATLAB®

Ubiquitous in daily life, electric motors/generators are used in a wide variety of applications, from home appliances to internal combustion engines to hybrid electric cars. They produce electric energy in all electric power plants as generators and motion control that is necessary in all industries to increase productivity, save...

An Introduction to Analysis of Financial Data with R
An Introduction to Analysis of Financial Data with R

A complete set of statistical tools for beginning financial analysts from a leading authority

Written by one of the leading experts on the topic, An Introduction to Analysis of Financial Data with R explores basic concepts of visualization of financial data. Through a fundamental balance between theory and...

Result Page: 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy