Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
In Pursuit of the Traveling Salesman: Mathematics at the Limits of Computation
In Pursuit of the Traveling Salesman: Mathematics at the Limits of Computation

What is the shortest possible route for a traveling salesman seeking to visit each city on a list exactly once and return to his city of origin? It sounds simple enough, yet the traveling salesman problem is one of the most intensely studied puzzles in applied mathematics--and it has defied solution to this day. In this book, William Cook...

Trust-Based Selling: Finding and Keeping Customers for Life
Trust-Based Selling: Finding and Keeping Customers for Life

The first year of developing a new sales territory or establishing new customers is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on products, grab a customer list, start calling for appointments, discover opportunities, and close deals. In...

The Unwritten Rules of the Highly Effective Job Search: The Proven Program Used by the World’s Leading Career Services Company
The Unwritten Rules of the Highly Effective Job Search: The Proven Program Used by the World’s Leading Career Services Company

The Proven Program Used by 600,000 Job Hunters!

You put hours and hours of hard work into your job search and the companies you've contacted never call. It's a story all too common in the fast-paced, highly competitive world of job hunting. Nothing is more discouraging than sending one resumé after another...

Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Sonar Code Quality Testing Essentials
Sonar Code Quality Testing Essentials
Developers continuously strive to achieve higher levels of source code quality. It is the holy grail in the software development industry. Sonar is an all-out platform confronting quality from numerous aspects as it covers quality on seven axes, provides an abundance of hunting tools to pinpoint code defects, and continuously...
Encyclopedia of Civil War Shipwrecks
Encyclopedia of Civil War Shipwrecks
On the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,...
Sales Hunting: How to Develop New Territories and Major Accounts in Half the Time  Using Trust as Your Weapon
Sales Hunting: How to Develop New Territories and Major Accounts in Half the Time Using Trust as Your Weapon

The first year of developing a new sales territory is a daunting task—especially in dog-eat-dog industries. The traditional advice is to train quickly on product, grab a customer list, start calling for appointments, discover opportunities, and close deals. In fact, almost every sales model out there is based on nothing more than...

What About Golden Retrievers: The Joy and Realities of Living with a Golden
What About Golden Retrievers: The Joy and Realities of Living with a Golden
How long do Golden Retrievers live?

How much does it cost to keep a Golden?

What kind of training do Goldens need to become good pets?

That little Golden Retriever puppy is so adorable–but is he the right dog for you? Many prospective dog owners don’t ask the questions they should when deciding to bring a...

The Wall Street Professional's Survival Guide: Success Secrets of a Career Coach
The Wall Street Professional's Survival Guide: Success Secrets of a Career Coach

This is the only complete, up-to-date, and practical guide for financial industry professionals seeking new or better jobs in today’s brutally competitive environment. Author Roy Cohen spent more than 10 years providing outplacement services to Goldman Sachs’ employees. In this book, he shares finance-specific...

Result Page: 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy