Home | Amazing | Today | Tags | Publishers | Years | Search 
iOS Application Security: The Definitive Guide for Hackers and Developers
iOS Application Security: The Definitive Guide for Hackers and Developers
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.

After a crash course
...
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Forex Trading: A Comprehensive beginner’s guide to learn the realms of Forex trading from A-Z
Forex Trading: A Comprehensive beginner’s guide to learn the realms of Forex trading from A-Z

Even though there are many books available, you will not get the desired knowledge if you don’t find the right book. If you are searching for a book to help you squeeze out money from Forex trading, this is not the book you are hunting for. Of course, trading is about money, but A comprehensive beginners guide to learn the realms of...

Paralegal Career For Dummies (For Dummies (Career/Education))
Paralegal Career For Dummies (For Dummies (Career/Education))

Your career as a top-notch paralegal starts here

The demand for paralegal professionals is exploding, and Paralegal Career For Dummies, 2nd Edition explains the skills and requirements needed to pursue this rewarding career. Inside, you’ll discover the ins and outs of paralegal skills, from preparing...

Recalculating: Navigate Your Career Through the Changing World of Work
Recalculating: Navigate Your Career Through the Changing World of Work

A leading workplace expert provides an inspirational, practical, and forward-looking career playbook for recent grads, career changers, and transitioning professionals looking to thrive in today’s rapidly evolving workplace.

Covid-19 has heightened career uncertainty in a work landscape dominated...

Dynamics AX: A Guide to Microsoft Axapta
Dynamics AX: A Guide to Microsoft Axapta
Axapta is Microsoft’s flagship ERP system and the most exciting ERP product currently on
the scene. If Axapta hasn’t come to a computer near you yet, it will soon.

We’d like to start by offering the most valuable piece of advice we have for anyone working
with Axapta (and with any complex system, for that
...
Picture Yourself Ghost Hunting
Picture Yourself Ghost Hunting
"Picture Yourself Ghost Hunting: Step-by-Step Instruction for Exploring Haunts and Finding Spirits, Spooks, and Specters" introduces novice paranormal explorers to the history, techniques, and equipment used in the search for proof of life after death, or simply, ghosts. Written like a field guide to ghost hunting, the book begins by...
Real-Resumes for Computer Jobs (Real-Resumes Series)
Real-Resumes for Computer Jobs (Real-Resumes Series)
Every resume and cover letter in this book actually worked. And most of the resumes and cover letters have common features: all are one-page, all are in the chronological format, and all resumes are accompanied by a companion cover letter. The book is divided into three parts. Part One provides some advice about job hunting. Step...
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and...

Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy