Home | Amazing | Today | Tags | Publishers | Years | Search 
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

The Art of Readable Code (Theory in Practice)
The Art of Readable Code (Theory in Practice)

As programmers, we’ve all seen source code that’s so ugly and buggy it makes our brain ache. Over the past five years, authors Dustin Boswell and Trevor Foucher have analyzed hundreds of examples of "bad code" (much of it their own) to determine why they’re bad and how they could be improved. Their...

Guarding Your Business: A Management Approach to Security (Modern Approaches in Geophysics)
Guarding Your Business: A Management Approach to Security (Modern Approaches in Geophysics)

Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered...

Hypertension: Methods and Protocols (Methods in Molecular Medicine)
Hypertension: Methods and Protocols (Methods in Molecular Medicine)

A collection of new and essential molecular techniques for cardiovascular research. These readily reproducible methods range widely from producing congenic, consomic, transgenic, and knockout models of hypertension to the gene transfer of specific genetic material using nonviral (polymers, liposomes, and antisense agents) and adenoviral...

Coding4Fun: 10 .NET Programming Projects for Wiimote, YouTube, World of Warcraft, and More
Coding4Fun: 10 .NET Programming Projects for Wiimote, YouTube, World of Warcraft, and More

How would you like to build an Xbox game, use your Nintendo Wiimote to create an electronic whiteboard, or build your own peer-to-peer application? Coding4Fun helps you tackle some cool software and hardware projects using a range of languages and free Microsoft software. Now you can code for fun with C#, VB, ASP.NET, WPF,...

SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, Second Edition

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award

"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog

SQL injection represents...

Blueprints Visual Scripting for Unreal Engine
Blueprints Visual Scripting for Unreal Engine

Build professional 3D games with Unreal Engine 4's Visual Scripting system

About This Book

  • Take your game designs from inspiration to a fully playable game that you can share with the world, without writing a single line of code.
  • Learn to use visual scripting to develop gameplay...
Learning Puppet for Windows Server
Learning Puppet for Windows Server

Organize your Windows environment using Puppet tools to unload administrative burdens in a short time!

About This Book

  • Learn to install and implement a Puppet server for Windows administration
  • Script Puppet manifests, functions, templates and facts for Windows
  • A...
Smart Grid Security: Innovative Solutions for a Modernized Grid
Smart Grid Security: Innovative Solutions for a Modernized Grid

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power...

Securing Social Media in the Enterprise
Securing Social Media in the Enterprise

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This...

Android Hacker's Handbook
Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...

A Dictionary of Computer Science (Oxford Quick Reference)
A Dictionary of Computer Science (Oxford Quick Reference)

Previously named A Dictionary of Computing, this bestselling dictionary has been renamed A Dictionary of Computer Science, and fully revised by a team of computer specialists, making it the most up-to-date and authoritative guide to computing available. Containing over 6,500 entries and with expanded coverage of multimedia,...

Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy