Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.

...

Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development
Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development

This book will teach the concepts of test driven development in Java so you can build clean, maintainable and robust code

Key Features

  • Explore the most popular TDD tools and frameworks and become more proficient in building applications
  • Create applications with better code...
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices

Set up complete CI and CD pipelines for your serverless applications using DevOps principles

Key Features

  • Understand various services for designing serverless architecture
  • Build CD pipelines using various cloud providers for your serverless applications
  • ...
CO2 Injection in the Network of Carbonate Fractures (Petroleum Engineering)
CO2 Injection in the Network of Carbonate Fractures (Petroleum Engineering)

This book presents guidelines for the design, operation and monitoring of CO2 injection in fractured carbonates, with low permeability in the rock matrix, for geological storage in permanent trapping. 

CO2 migration is dominated by fractures in formations where the hydrodynamic and geochemical effects induced by the...

Building an ASP .NET Intranet
Building an ASP .NET Intranet

The authors base the book’s sample intranet on Microsoft’s free best practices example, the IBuySpy Portal, and teach you to quickly create an application that exploits the advanced features of ASP.NET. A full explanation of the IBuySpy Portal architecture is provided, which allows you to maximize product usage.

Further,...

Qualitative Case Studies on Implementation of Enterprise Wide Systems
Qualitative Case Studies on Implementation of Enterprise Wide Systems

Qualitative Case Studies on Implementation of Enterprise Wide Systems focuses on ERP Implementations in the tertiary education industry—a sector which is important not only for advancing the economy and quality of life in industrialized nations but also as a major source of export income. Systems failure in this information...

Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
Game Developer's Market Guide (Game Development)
Game Developer's Market Guide (Game Development)
This book is for everyone involved in game development and for those who
want to break into the industry.
Calling someone a “game developer” covers a lot of territory. A developer might be
an artist making 3D models; a producer handling external development; a level
designer or composer; a programmer or writer. The
...
Building Parsers With Java
Building Parsers With Java
Parser building is a powerful programming technique that opens a world of opportunity for designing how users interact with applications. By creating mini-languages, you can precisely address the requirements of your application development domain. Writing your own parsers empowers you to access a database more effectively than SQL to efficiently...
E-Ffective Writing for E-Learning Environments (Cases on Information Technology)
E-Ffective Writing for E-Learning Environments (Cases on Information Technology)

E-ffective Writing for E-Learning Environments integrates research and practice in user-centered design and learning design for instructors in post-secondary institutions and learning organizations who are developing e-learning resources. The book is intended as a development guide for experts in areas other than instructional or...

Professional BizTalk Server 2006
Professional BizTalk Server 2006
This book provides insight into how industry experts have successfully architected, developed, and maintained Microsoft BizTalk Server in mission-critical environments. Authored by highly-regarded consultants with a wealth of knowledge on designing, building, and operating enterprise applications using BizTalk, this comprehensive guide gives you...
Patterns for Parallel Programming (Software Patterns Series)
Patterns for Parallel Programming (Software Patterns Series)

The Parallel Programming Guide for Every Software Developer

From grids and clusters to next-generation game consoles, parallel computing is going mainstream. Innovations such as Hyper-Threading Technology, HyperTransport Technology, and multicore microprocessors from IBM, Intel, and Sun are accelerating the...

unlimited object storage image
Result Page: 812 811 810 809 808 807 806 805 804 803 802 801 800 799 798 797 796 795 794 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy