Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...

Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day
Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day

A ground-breaking account of the first 24 hours of the D-Day invasion told by a symphony of incredible accounts of unknown and unheralded members of the Allied – and Axis – forces.

An epic battle that involved 156,000 men, 7,000 ships and 20,000 armoured vehicles, D-Day was, above all, a tale of
...

The Secret Lives of Customers: A Detective Story About Solving the Mystery of Customer Behavior
The Secret Lives of Customers: A Detective Story About Solving the Mystery of Customer Behavior
A "detective story" that delivers key insights for any businessperson asking the questions: who really are our customers, why do we lose them, how do we regain them?

Customers can be a mystery. Despite the availability of more data than ever before, everyone, from the CEO to salespeople in the
...
MAKE: Electronics: Learning Through Discovery
MAKE: Electronics: Learning Through Discovery
Want to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the...
Mathematics For JEE (Main & Advanced), Geometry- Vol. 4
Mathematics For JEE (Main & Advanced), Geometry- Vol. 4
The JEE (Main & Advanced) is one of the hardest exams to crack for students, for a very simple reason – concepts cannot be learned by rote, they have to be absorbed, and IIT believes in strong concepts. Each question in the JEE (Main & Advanced) entrance exam is meant to push the analytical ability of the student to...
Hacking BlackBerry: ExtremeTech
Hacking BlackBerry: ExtremeTech
Here's an even better way to get your BlackBerry fix

Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or...

Adhesion in Microelectronics (Adhesion and Adhesives: Fundamental and Applied Aspects)
Adhesion in Microelectronics (Adhesion and Adhesives: Fundamental and Applied Aspects)

This comprehensive book will provide both fundamental and applied aspects of adhesion pertaining to microelectronics in a single and easily accessible source. Among the topics to be covered include;

  • Various theories or mechanisms of adhesion
  • Surface (physical or chemical) characterization of materials as it...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Hacking GPS (ExtremeTech)
Hacking GPS (ExtremeTech)
You'll get lost in this book, but nowhere else

Your GPS is a really cool toy, but what if you could make it even cooler? What if you could build and hook up data cables, modify your iPAQ cradle to take a GPS connection, tweak the firmware, hook up to your PC without expensive software, use GPS data in a hundred creative ways, even solar-power...

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Tika in Action
Tika in Action

Summary

Tika in Action is a hands-on guide to content mining with Apache Tika. The book's many examples and case studies offer real-world experience from domains ranging from search engines to digital asset management and scientific data processing.

About the Technology

Tika is an...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy