Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Java EE 8 Recipes: A Problem-Solution Approach
Java EE 8 Recipes: A Problem-Solution Approach
The Java platform is one of the most widely used platforms for application development in the world. The platform is so popular that there are several different flavors of Java that can be used for developing applications that run on different mediums. From development of desktop, mobile, or web applications and hardware operating...
Beginning EJB in Java EE 8: Building Applications with Enterprise JavaBeans
Beginning EJB in Java EE 8: Building Applications with Enterprise JavaBeans
Build powerful back-end business logic and complex Enterprise JavaBeans (EJB)-based applications using Java EE 8, Eclipse Enterprise for Java (EE4J), Web Tools Project (WTP), and the Microprofile platform. Targeted at Java and Java EE developers, with or without prior EJB experience, this...
Angular 5 Projects: Learn to Build Single Page Web Applications Using 70+ Projects
Angular 5 Projects: Learn to Build Single Page Web Applications Using 70+ Projects

Learn to build single page web apps using Angular 5 and TypeScript by working through 70+ mini-projects. With hundreds of code examples you gain a thorough understanding of the Angular 5 ecosystem and how to work within it.

You'll begin by understanding the benefits of Angular 5 vs older versions, and how this...

Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice

Create clean code with Dependency Injection principles

Key Features

  • Use DI to make your code loosely coupled to manage and test your applications easily on Spring 5 and Google Guice
  • Learn the best practices and methodologies to implement DI
  • Write more...
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
The Definitive Guide to JSF in Java EE 8: Building Web Applications with JavaServer Faces
The Definitive Guide to JSF in Java EE 8: Building Web Applications with JavaServer Faces
Learn and master the new features in the JSF 2.3 MVC web framework in this definitive guide written by two of the JavaServer Faces (JSF) specification leads. The authors take you through real-world examples that demonstrate how these new features are used with other APIs in Java EE 8. You’ll see the new and exciting ways...
Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends
Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends

Use Java features such as JAX-RS, EJBs, and JPAs to build powerful middleware for newer architectures such as the cloud

Key Features

  • Explore EJBs to build middleware solutions for enterprise and distributed applications
  • Understand middleware designs such as event-based and...
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Mastering JavaScript Design Patterns - Second Edition
Mastering JavaScript Design Patterns - Second Edition

Key Features

  • Learn how to use tried and true software design methodologies to enhance your JavaScript code
  • Discover robust JavaScript implementations of classic and advanced design patterns
  • Packed with easy-to-follow examples that can be used to create reusable code and...
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy