Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python

Leverage the simplicity of Python and available libraries to build web security testing tools for your application

Key Features

  • Understand the web application penetration testing methodology and toolkit using Python
  • Write a web crawler/spider with the Scrapy library
  • ...
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Basic Electronics for Scientists and Engineers
Basic Electronics for Scientists and Engineers

Ideal for a one-semester course, this concise textbook covers basic electronics for undergraduate students in science and engineering. Beginning with the basics of general circuit laws and resistor circuits to ease students into the subject, the textbook then covers a wide range of topics, from passive circuits through to semiconductor-based...

Electrical and Electronic Principles and Technology
Electrical and Electronic Principles and Technology
In this book John Bird introduces electrical principles and technology through examples rather than theory - enabling students to develop a sound understanding of the principles needed by technicians in fields such as electrical engineering, electronics and telecommunications. No previous background in engineering is assumed, making this an ideal...
Introduction to General Relativity
Introduction to General Relativity
A student-friendly style, over 100 illustrations, and numerous exercises are brought together in this textbook for advanced undergraduate and beginning graduate students in physics and mathematics. Lewis Ryder develops the theory of general relativity in detail. Covering the core topics of black holes, gravitational radiation, and cosmology, he...
Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

CNET Do-It-Yourself Home Networking Projects
CNET Do-It-Yourself Home Networking Projects
You may be thinking that home networking is so ubiquitous there could not possibly be anything new or different to do with this interconnected marvel of now everyday technology. You can surf the Web on any of two to three PCs, upload and download photos, fill an MP3 player to the brim, and chat with your friends and family via IM—what more...
JBoss RichFaces 3.3
JBoss RichFaces 3.3
JBoss RichFaces is a rich component library for JavaServer Faces and an AJAX framework that allows easy integration of AJAX capabilities into complex business applications. Do you wish to eliminate the time involved in writing JavaScript code and managing JavaScript-compatibility between browsers to build an AJAX web application quickly?
...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

Modern Operating Systems
Modern Operating Systems
For software development professionals and computer science students, Modern Operating Systems gives a solid conceptual overview of operating system design, including detailed case studies of Unix/Linux and Windows 2000.

What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand...

Result Page: 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy