Home | Amazing | Today | Tags | Publishers | Years | Search 
JavaMail API
JavaMail API
Email was the Internet’s first killer app. One of the most frequently asked questions about Java is how to send email from a Java applet or application. While it’s certainly possible to write a Java program that uses sockets to communicate with mail servers, this requires detailed knowledge of some fairly...
Active Directory Cookbook
Active Directory Cookbook

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.

...

Pro Spring Security
Pro Spring Security

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security will be a reference and advanced tutorial
...

Metasploit Penetration Testing Cookbook, Second Edition
Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in...

Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

The Packaging Designer's Book of Patterns
The Packaging Designer's Book of Patterns

For more than two decades, The Packaging Designer's Book of Patterns has served as an indispensable source of ideas and practical solutions for a wide range of packaging design challenges.

This Fourth Edition offers more than 600 patterns and structural designs—more than any other book—all drawn to...

Windows 8 and Office 2013 For Dummies
Windows 8 and Office 2013 For Dummies

Learn to:

  • Navigate the Windows 8 Start screen
  • Create user accounts and set passwords
  • Use Word, Excel®, PowerPoint®, and Outlook®

Master the basics of

Windows 8 and Office 2013!

Windows and Office work together to turn your PC into a...

Instant PHP Web Scraping
Instant PHP Web Scraping

Get up and running with the basic techniques of web scraping using PHP

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results
  • Build a re-usable scraping class to expand on for future projects
  • Scrape, parse, and save data from any...
Web Application Development with Yii 2 and PHP
Web Application Development with Yii 2 and PHP

Fast-track your web application development using the new generation Yii PHP framework

About This Book

  • Implement real-world web application features efficiently using the Yii development framework
  • Each chapter provides micro-examples that build upon each other to create the final...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy