Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Programming the BeagleBone
Programming the BeagleBone

About This Book

  • Quickly develop electronics projects that interact with Internet applications using JavaScript and Python
  • Learn about electronics components such as sensors and motors, and how to communicate with them by writing programs
  • A step-by-step guide to explore the...
Python Game Programming by Example
Python Game Programming by Example

A pragmatic guide for developing your own games with Python

About This Book

  • Strengthen your fundamentals of game programming with Python language
  • Seven hands-on games to create 2D and 3D games rapidly from scratch
  • Illustrative guide to explore the different GUI libraries...
Exploiting Software : How to Break Code
Exploiting Software : How to Break Code
How does software break? How do attackers make software break on purpose? Why are
firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?
What tools can be used to break software? This book provides the answers.
Exploiting Software is loaded with examples of real attacks, attack patterns, tools,
...
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Xamarin Studio for Android Programming: A C# Cookbook
Xamarin Studio for Android Programming: A C# Cookbook

Over 50 hands-on recipes to help you get grips with Xamarin Studio and C# programming to develop market-ready Android applications

About This Book

  • Create Android applications with C# and Xamarin
  • Reuse your Android application to develop iOS and Windows Phone applications
  • ...
Supervised Sequence Labelling with Recurrent Neural Networks
Supervised Sequence Labelling with Recurrent Neural Networks

Supervised sequence labelling is a vital area of machine learning, encompassing tasks such as speech, handwriting and gesture recognition, protein secondary structure prediction and part-of-speech tagging. Recurrent neural networks are powerful sequence learning tools—robust to input noise and distortion, able to exploit long-range...

Cocos2d-x Game Development Essentials
Cocos2d-x Game Development Essentials

Create iOS and Android games from scratch using Cocos2d-x

About This Book

  • Create and run Cocos2d-x projects on iOS and Android platforms.
  • Find practical solutions to many real-world game development problems.
  • Learn the essentials of Cocos2d-x by writing code and following...
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Combinatorial Search: From Algorithms to Systems
Combinatorial Search: From Algorithms to Systems

Although they are believed to be unsolvable in general, tractability results suggest that some practical NP-hard problems can be efficiently solved. Combinatorial search algorithms are designed to efficiently explore the usually large solution space of these instances by reducing the search space to feasible regions and using heuristics to...

Julia 1.0 Programming: Dynamic and high-performance programming to build fast scientific applications, 2nd Edition
Julia 1.0 Programming: Dynamic and high-performance programming to build fast scientific applications, 2nd Edition

Enter the exciting world of Julia, a high-performance language for technical computing

Key Features

  • Leverage Julia's high speed and efficiency for your applications
  • Work with Julia in a multi-core, distributed, and networked environment
  • Apply Julia to...
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy