Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Application Security, A Beginner's Guide
Web Application Security, A Beginner's Guide

Security Smarts for the Self-Guided IT Professional

“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting...

Baseball Hacks : Tips & Tools for Analyzing and Winning with Statistics
Baseball Hacks : Tips & Tools for Analyzing and Winning with Statistics
Baseball Hacks isn't your typical baseball book--it's a book about how to watch, research, and understand baseball. It's an instruction manual for the free baseball databases. It's a cookbook for baseball research. Every part of this book is designed to teach baseball fans how to do something. In short, it's a...
Linux Multimedia Hacks
Linux Multimedia Hacks

The fact that Linux has more multimedia application choices than Mac OS X and Windows combined may come as a surprise to many, but not to those who know Linux well. In Linux Multimedia Hacks, author Kyle Rankin showcases the best available multimedia tools so you can maximize the entertainment...

Windows 8 Hacks
Windows 8 Hacks

Windows 8 is quite different than previous Microsoft operating systems, but it’s still eminently hackable. With this book, you’ll learn how to make a variety of modifications, from speeding up boot time and disabling the Lock screen to hacking native apps and running Windows 8 on a Mac. And that’s just the...

Pro CSS and HTML Design Patterns
Pro CSS and HTML Design Patterns
This is a solutions book for styling HTML 4.01 and XHTML 1.1 with CSS 2.1. It contains more than 350 design patterns you can put to use right away. Each design pattern is modular and customizable, and you can combine patterns to create an unlimited number of designs.

Each design pattern has been thoroughly tested and proven to work in
...
Yahoo! Hacks
Yahoo! Hacks

Yahoo! took the world by storm in the 1990s as a one-of-a-kind, searchable list of interesting web sites. But ten years later, it has expanded into a department store overflowing with useful and innovative tools and services-from email, blogging, social networking, and instant messaging, to news, financial markets, shopping,...

Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Windows XP in a Snap
Windows XP in a Snap

You have a great computer with the Windows XP operating system. You surf the web, send e-mail and play the occasional game of Solitaire. There are more programs on it than you know what to do with, but you don't delete any of them in case you ever figure out what they do. Windows XP In a Snap can show you all of that and more than you...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Mac OS X Snow Leopard Pocket Guide (Pocket ref / guide)
Mac OS X Snow Leopard Pocket Guide (Pocket ref / guide)
Whether you're new to the Mac or a longtime user, this handy book is the quickest way to get up to speed on Snow Leopard. Packed with concise information in an easy-to-read format, Mac OS X Snow Leopard Pocket Guide covers what you need to know and is an ideal resource for problem-solving on the fly.

This book goes right to the
...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career
The Inside Track to Excelling As a Business Analyst: Soft Skills That Can Accelerate Your Career

The role of the business analyst sits at the intersection of business operations, technology, and change management. The job requires a plethora of both soft skills and technical skills, as it must translate the needs of business users into action items for functional applications. On top of this, in-demand technologies...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy