Penetration Testing with Perl
Harness the power of Perl to perform professional penetration testing
About This Book
Write your own custom information security tools using Perl and object-oriented Perl modules
Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
The Theory of Gambling and Statistical Logic, Second Edition
Early in his rise to enlightenment, man invented a concept that has since been variously viewed as a vice, a crime, a business, a pleasure, a type of magic, a disease, a folly, a weakness, a form of sexual substitution, an expression of the human instinct. He invented gambling.
Recent advances in the field, particularly...
The AWK Programming Language
Computer users spend a lot of time doing simple, mechanical data manipulation
- changing the format of data, checking its validity, finding items with
some property, adding up numbers, printing reports, and the like. All of these
jobs ought to be mechanized, but it's a real nuisance to have to write a specialpurpose
program in a...
Algorithms, Data Structures, and Problem Solving With C++ This book was designed for a second course in computer science, which has typically been known as CS-2 Data Structures. The content of CS-2 has been evolving over some time, but there is general agreement that topics such as structures, pointers, and data structures should be taught, along with an introduction to algorithm analysis and a general... Circuit-Bending: Build Your Own Alien Instruments (ExtremeTech) Fans will get bent out of shape if they miss the first book to cover circuit-bending-""bending,"" for short-the method by which an electronic toy or a device such as a keyboard is short-circuited and modified to create an entirely different sound Written by the inventor of the technology, this book covers the tools of the...
|Result Page: 36 35 34 33 32 31 30 29 28 27 |