Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Architects of Intelligence: The truth about AI from the people building it
Architects of Intelligence: The truth about AI from the people building it

Financial Times Best Books of the Year 2018

TechRepublic Top Books Every Techie Should Read

Book Description

How will AI evolve and what major innovations are on the horizon? What will its impact be on the job market, economy, and society? What is the path toward human-level...

Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang

Explore the fundamentals of systems programming starting from kernel API and filesystem to network programming and process communications

Key Features

  • Learn how to write Unix and Linux system code in Golang v1.12
  • Perform inter-process communication using pipes, message...
Git in Practice
Git in Practice

Summary

Git in Practice is a collection of 66 tested techniques that will optimize the way you and your team manage your development projects. The book begins with a brief reminder of the core version control concepts you need when using Git and moves on to the high-value features you may not have explored...

Shell Scripting Recipes: A Problem-Solution Approach (Expert's Voice in Open Source)
Shell Scripting Recipes: A Problem-Solution Approach (Expert's Voice in Open Source)

In today’s IT environment, harried system administrators are finding themselves more overworked than ever. This book helps them regain some of the lost time spent creating and testing shell scripts, and guides readers through more than 150 much-needed and practical real-world examples.

Because all scripts found in this book are...

Raspberry Pi System Software Reference
Raspberry Pi System Software Reference

Raspberry Pi is Linux, but it's a unique flavor of Linux, specifically for the ARM-based Pi. Raspberry Pi Software Reference guides you through the boot process, including options for tweaking HDMI, memory, and other boot options. You'll learn the details of run levels and creating new services, and how to use the custom...

LPIC-2 Linux Professional Institute Certification Study Guide: Exams 201 and 202
LPIC-2 Linux Professional Institute Certification Study Guide: Exams 201 and 202

Why should you learn about Linux? It’s a fast-growing operating system, and it’s inexpensive and flexible. Linux is also a major player in the small and mid-sized server field, and it’s an increasingly viable platform for workstation and desktop use as well. By understanding Linux, you’ll...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Exploring SE for Android
Exploring SE for Android

Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

About This Book

  • Learn the fundamental security models and motivations behind Linux, SELinux, and SE for Android.
  • Build and enable current security enhancements from the SE for Android project...
Programming the Microsoft Windows Driver Model, Second Edition
Programming the Microsoft Windows Driver Model, Second Edition

Writing a WDM driver is much like writing a kernel-mode driver for Windows NT 4.0. It's a bit easier because you don't have to detect and configure your own hardware. Ironically, it's simultaneously harder because correctly handling Plug and Play and power management is fiendishly difficult. If...

Embedded Linux Projects Using Yocto Project Cookbook
Embedded Linux Projects Using Yocto Project Cookbook

Over 70 hands-on recipes for professional embedded Linux developers to optimize and boost their Yocto know-how

About This Book

  • Explore best practices for all embedded product development stages
  • Use what is quickly becoming the standard embedded Linux product builder framework, the Yocto...
Result Page: 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy