Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
RESTful Java Web Services - Second Edition
RESTful Java Web Services - Second Edition

Design scalable and robust RESTful web services with JAX-RS and Jersey extension APIs

About This Book

  • Get to grips with the portable Java APIs used for JSON processing
  • Design solutions to produce, consume, and visualize RESTful web services using WADL, RAML, and Swagger
  • A...
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
Data Model Patterns: A Metadata Map (The Morgan Kaufmann Series in Data Management Systems)
A very ambitious undertaking, masterfully described. To the best of my knowledge, this is the first published version of the detailed models implied by the Zachman Framework. David Hay builds the models one step at a time, describing in each increment why the new entities were added, and how they related to the rest of the model. At least as...
.Net Framework 4.5 Expert Programming Cookbook
.Net Framework 4.5 Expert Programming Cookbook

.Net is an architecture neutral and programming language agnostic framework that caters to all requirements, varying from business solutions to multiplayer online 3D games. Version 4.5 added many new features to help with the development of robust and user-friendly solutions. This book will teach you the new features as well as the advanced...

Git Version Control Cookbook: Leverage version control to transform your development workflow and boost productivity, 2nd Edition
Git Version Control Cookbook: Leverage version control to transform your development workflow and boost productivity, 2nd Edition

A series of practical recipes to simplify the Git learning experience and increase your productivity when using Git version control

Key Features

  • Explore practical recipes to use Git's most advanced features
  • Learn how Git references its objects and how history is...
Essential C# 6.0 (5th Edition) (Addison-Wesley Microsoft Technology)
Essential C# 6.0 (5th Edition) (Addison-Wesley Microsoft Technology)

“Welcome to one of the greatest collaborations you could dream of in the world of C# books—and probably far beyond!”

—From the Foreword by Mads Torgersen, C# Program Manager, Microsoft

...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data...
SignalR: Real-time Application Development
SignalR: Real-time Application Development

As a .NET developer, you won't want to be left behind in the trend towards real-time applications. This book brings you up to speed in no time with a comprehensive guide to the SignalR framework.

Overview

  • Develop real-time applications across numerous platforms
  • Create scalable...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Hands-On Recommendation Systems with Python: Start building powerful and personalized, recommendation engines with Python
Hands-On Recommendation Systems with Python: Start building powerful and personalized, recommendation engines with Python

With Hands-On Recommendation Systems with Python, learn the tools and techniques required in building various kinds of powerful recommendation systems (collaborative, knowledge and content based) and deploying them to the web

Key Features

  • Build industry-standard recommender systems
  • ...
Pro Java 8 Programming
Pro Java 8 Programming

Pro Java 8 Programming covers the core Java development kit. It takes advantage of the finer points of the core standard edition (SE) and development kit version 8. You'll discover the particulars of working with the Java language and APIs to develop applications in many different contexts. You will also delve into more advanced...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy