Home | Amazing | Today | Tags | Publishers | Years | Search 
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Ionic Cookbook: Recipes to create cutting-edge, real-time hybrid mobile apps with Ionic, 3rd Edition
Ionic Cookbook: Recipes to create cutting-edge, real-time hybrid mobile apps with Ionic, 3rd Edition

Solve all your Ionic-related issues through dedicated recipes that will help you get the best out of Ionic. Working with Ionic components to find out the best way to share data between them effectively.

Key Features

  • Leverage Ionic 3.9 and its exciting new features to create cutting-edge,...
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python

Leverage the simplicity of Python and available libraries to build web security testing tools for your application

Key Features

  • Understand the web application penetration testing methodology and toolkit using Python
  • Write a web crawler/spider with the Scrapy library
  • ...
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers

Choose the smarter way to learn about containerizing your applications and running them in production.

Key Features

  • Deploy and manage highly scalable, containerized applications with Kubernetes
  • Build high-availability Kubernetes clusters
  • Secure your...
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity
Bash Cookbook: Leverage Bash scripting to automate daily tasks and improve productivity

Create simple to advanced shell scripts and enhance your system functionality with effective recipes

Key Features

  • Automate tedious and repetitive tasks
  • Create several novel applications ranging from a simple IRC logger to a Web Scraper
  • Manage your system...
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
The Definitive Guide to AdonisJs: Building Node.js Applications with JavaScript
The Definitive Guide to AdonisJs: Building Node.js Applications with JavaScript

Learn everything you need to master the AdonisJs framework, including topics such as interacting with a database, rendering templates, writing asynchronous code, and hosting sites with SSL. Along the way, you’ll see how to build a commerce application, which lists products and allows shoppers to register and purchase those...

Java EE 8 Recipes: A Problem-Solution Approach
Java EE 8 Recipes: A Problem-Solution Approach

The Java platform is one of the most widely used platforms for application development in the world. The platform is so popular that there are several different flavors of Java that can be used for developing applications that run on different mediums. From development of desktop, mobile, or web applications and hardware operating systems,...

Proceedings of 3rd International Conference on Computer Vision and Image Processing: CVIP 2018, Volume 1 (Advances in Intelligent Systems and Computing)
Proceedings of 3rd International Conference on Computer Vision and Image Processing: CVIP 2018, Volume 1 (Advances in Intelligent Systems and Computing)

This book is a collection of carefully selected works presented at the Third International Conference on Computer Vision & Image Processing (CVIP 2018). The conference was organized by the Department of Computer Science and Engineering of PDPM Indian Institute of Information Technology, Design & Manufacturing, Jabalpur, India...

Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Applied Cryptography in .NET and Azure Key Vault: A Practical Guide to Encryption in .NET and .NET Core
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust...
Ruby on Rails Tutorial (6th Edition) (Addison-Wesley Professional Ruby Series)
Ruby on Rails Tutorial (6th Edition) (Addison-Wesley Professional Ruby Series)
Used by sites as varied as Twitter, GitHub, Disney, and Airbnb, Ruby on Rails is one of the most popular frameworks for developing web applications, but it can be challenging to learn and use. Whether you’re new to web development or new only to Rails, Ruby on Rails™ Tutorial, Sixth Edition , is the...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy