Home | Amazing | Today | Tags | Publishers | Years | Search 
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Advanced Raspberry Pi: Raspbian Linux and GPIO Integration
Advanced Raspberry Pi: Raspbian Linux and GPIO Integration

Jump right into the pro-level guts of the Raspberry Pi with complete schematics and detailed hardware explanations as your guide. You'll tinker with runlevels, reporting voltages and temperatures, and work on a variety of project examples that you can tune for your own project ideas.. 

This book is fully updated...

Electronic Design Automation of Analog ICs combining Gradient Models with Multi-Objective Evolutionary Algorithms (SpringerBriefs in Applied Sciences and Technology)
Electronic Design Automation of Analog ICs combining Gradient Models with Multi-Objective Evolutionary Algorithms (SpringerBriefs in Applied Sciences and Technology)
This book applies to the scientific area of electronic design automation (EDA) and addresses the automatic sizing of analog integrated circuits (ICs). Particularly, this book presents an approach to enhance a state-of-the-art layout-aware circuit-level optimizer (GENOM-POF), by embedding statistical knowledge from an automatically generated...
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics

Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.

This book builds upon the skills you learned in Volume 1...

Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Waste Recycling Technologies for Nanomaterials Manufacturing (Topics in Mining, Metallurgy and Materials Engineering)
Waste Recycling Technologies for Nanomaterials Manufacturing (Topics in Mining, Metallurgy and Materials Engineering)
This book discusses the recent advances in the wastes recycling technologies to provide low-cost and alternative ways for nanomaterials production. It shows how carbon nanomaterials can be synthesized from different waste sources such as banana fibers, argan (Argania spinosa) seed shells, corn grains, camellia oleifera shell, sugar cane...
   
   
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy