Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

Kali Linux Network Scanning Cookbook - Second Edition
Kali Linux Network Scanning Cookbook - Second Edition

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Python for Secret Agents - Second Edition
Python for Secret Agents - Second Edition

Gather, analyze, and decode data to reveal hidden facts using Python, the perfect tool for all aspiring secret agents

About This Book

  • Discover the essential features of Python programming: statements, variables, expressions, and many of the built-in data types
  • Use Python's standard...
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Advanced Penetration Testing for Highly-Secured Environments - Second Edition

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments

About This Book

  • Learn how to build your own pentesting lab environment to practice advanced techniques
  • Customize your own scripts, and learn methods to exploit 32-bit and 64-bit...
Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Android Wireless Application Development Volume II: Advanced Topics (3rd Edition) (Developer's Library)
Android Wireless Application Development Volume II: Advanced Topics (3rd Edition) (Developer's Library)

Pioneered by the Open Handset Alliance and Google,Android is a popular, free, opensource

mobile platform that has taken the wireless world by storm.This book and Android Wireless Application Development Volume I: Android Essentials provide comprehensive guidance for software development teams on designing,
...
Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions
Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions

Learn the ins and outs of the Industrial Internet of Things through subjects ranging from its history and evolution, right up to what the future holds.

About This Book

  • Define solutions that can connect existing systems and newer cloud-based solutions to thousands of thousands of edge devices and...
Scripting Intelligence: Web 3.0 Information, Gathering and Processing
Scripting Intelligence: Web 3.0 Information, Gathering and Processing
This book covers Web 3.0 technologies from a software developer’s point of view. While nontechies can use web services and portals that other people create, developers have the ability to be creators and consumers at the same time—by integrating their work with other people’s efforts.

The Meaning of Web 3.0
...
Designing Distributed Learning Environments with Intelligent Software Agents
Designing Distributed Learning Environments with Intelligent Software Agents
This book benefits the AI (artificial intelligence) and educational communities in their research and development, offering new and interesting research issues surrounding the development of distributed learning environments in the Semantic Web age.

With the rapid development of computer network and information technologies, especially
...
Applied Software Project Management
Applied Software Project Management
What makes software projects succeed? It takes more than a good idea and a team of talented programmers. A project manager needs to know how to guide the team through the entire software project. There are common pitfalls that plague all software projects and rookie mistakes that are made repeatedly--sometimes by the same people! Avoiding these...
Result Page: 20 19 18 17 16 15 14 13 12 11 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy