Home | Amazing | Today | Tags | Publishers | Years | Search 
Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Raspberry Pi Home Automation with Arduino - Second Edition
Raspberry Pi Home Automation with Arduino - Second Edition

Unleash the power of the most popular microboards to build convenient, useful, and fun home automation projects

About This Book

  • Revolutionize the way you automate your home by combining the power of the Raspberry Pi and Arduino
  • Build simple yet awesome home automated projects using an...
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys...

Securing PHP Apps
Securing PHP Apps

Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.

Is your PHP app truly secure? Let's make sure you get home...

Arduino Development Cookbook
Arduino Development Cookbook

Over 50 hands-on recipes to quickly build and understand Arduino projects, from the simplest to the most extraordinary

About This Book

  • Get quick, clear guidance on all the principle aspects of integration with the Arduino
  • Learn the tools and components needed to build engaging electronics...
Penetration Testing Bootcamp
Penetration Testing Bootcamp

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

The Food Lover's Garden: Growing, Cooking, and Eating Well (Urban Homesteader Hacks)
The Food Lover's Garden: Growing, Cooking, and Eating Well (Urban Homesteader Hacks)

Grow it, cook it, eat it! From the vegetable patch to the dinner table

Put off by the origin-unknown, not-so-fresh, pesticide-laden offerings at the grocery store? Hungry for delicious high-quality veg and fragrant herbs, and looking to have some control over where your food comes from but never planted a seed in...

Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Microsoft Dynamics GP 2013 Cookbook
Microsoft Dynamics GP 2013 Cookbook

For beginners or intermediate users this is a highly practical cookbook for Microsoft Dynamics GP. Now you can really get to grips with enterprise resource planning by engaging with real-world solutions through recipes and screenshots.

Overview

  • Understand the various tips and tricks to master Dynamics GP,...
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy