Home | Amazing | Today | Tags | Publishers | Years | Search 
The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL
React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL

Over 66 hands-on recipes that cover UI development, animations, component architecture, routing, databases, testing, and debugging with React

Key Features

  • Use essential hacks and simple techniques to solve React application development challenges
  • Create native mobile...
Java Deep Learning Projects: Implement 10 real-world deep learning applications using Deeplearning4j and open source APIs
Java Deep Learning Projects: Implement 10 real-world deep learning applications using Deeplearning4j and open source APIs

Build and deploy powerful neural network models using the latest Java deep learning libraries

Key Features

  • Understand DL with Java by implementing real-world projects
  • Master implementations of various ANN models and build your own DL systems
  • Develop...
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling
Deep Learning Essentials: Your hands-on guide to the fundamentals of deep learning and neural network modeling

Get to grips with the essentials of deep learning by leveraging the power of Python

Key Features

  • Your one-stop solution to get started with the essentials of deep learning and neural network modeling
  • Train different kinds of neural networks to tackle various problems in...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career
The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career

The role of the business analyst sits at the intersection of business operations, technology, and change management. The job requires a plethora of both soft skills and technical skills, as it must translate the needs of business users into action items for functional applications. On top of this, in-demand technologies...

The Morning Mind: Use Your Brain to Master Your Day and Supercharge Your Life
The Morning Mind: Use Your Brain to Master Your Day and Supercharge Your Life

Unleash positive thinking and productive imagination, and flip negative thoughts and behaviors into a lifetime to improve every aspect of your life—each morning, one day at a time.

Bad habits. Bad feelings. Bad mornings that turn into regrettable days.

Banish them all with simple brain...

Neurofitness: A Brain Surgeon’s Secrets to Boost Performance and Unleash Creativity
Neurofitness: A Brain Surgeon’s Secrets to Boost Performance and Unleash Creativity
From the operating room, where he performs some of the riskiest surgeries around, to the lab, where he works on leading clinical trials, Dr. Rahul Jandial is on the cutting edge of the latest advancements in neuroscience. This fascinating book draws on Dr. Jandial’s broad-spectrum expertise and brings together the best of various...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy