Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Hacking Windows XP (ExtremeTech)
Hacking Windows XP (ExtremeTech)
Check out the view from Steve Sinchak's Windows

Sure, Windows XP is already superior to its predecessors. But what if you could make it even better? Well, stop reading the cover and buy this book, because that’s exactly what it teaches you. This is the serious stuff–step-by-step hacks that beef up speed and security, customize...

Building Forums With Vbulletin
Building Forums With Vbulletin
vBulletin is a very popular, commercial discussion forums application. Written in PHP, it is the system of choice for many of the biggest and most popular discussion forums on the Internet.
This book takes you step by step through setting up and running your own vBulletin website. In easy-to-follow language, it will show you how to select a
...
Google Hacks: Tips & Tools for Finding and Using the World's Information
Google Hacks: Tips & Tools for Finding and Using the World's Information

Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.

Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding...

Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)
Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will...

SQL Hacks
SQL Hacks

Whether you're running Access, MySQL, SQL Server, Oracle, or PostgreSQL, this book will help you push the limits of traditional SQL to squeeze data effectively from your database. The book offers 100 hacks -- unique tips and tools -- that bring you the knowledge of experts who apply what they know in the real world to help you...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Professional ASP.NET 2.0 AJAX (Programmer to Programmer)
Professional ASP.NET 2.0 AJAX (Programmer to Programmer)

Are you ready to build more responsive web applications with richer UI elements? This detailed guide to the Microsoft AJAX Library shows you how to bring together ASP.NET 2.0 with an object-oriented approach to JavaScript development using this new framework from Microsoft. You'll gain an in-depth understanding of the ASP.NET AJAX architecture,...

Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools
Like the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used...
Hacking Vim 7.2
Hacking Vim 7.2

Vim is one of the most powerful open-source editors used by programmers and system administrators around the world. While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with the help of this book.

This book contains examples that cover...

MediaWiki 1.1: Beginner's Guide
MediaWiki 1.1: Beginner's Guide

MediaWiki is the free, open-source wiki engine software that powers Wikipedia and many of the other popular wikis across the Web. Written in PHP, it possesses many features that make it the engine of choice for large collaborative wikis: flexible markup, comprehensive user management, multimedia handling, and more. Whether you are creating a...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy