 |
|
 Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." — HD Moore, Founder of the Metasploit Project
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for... |  |  Pro OpenGL ES for Android
In 1985 I brought home a new shiny Commodore Amiga 1000, about one week after
they were released. Coming with a whopping 512K of memory, programmable
colormaps, a Motorola 68K CPU, and a modern multitasking operating system, it had
“awesome” writ all over it. Metaphorically speaking, of course. I thought it might
make a... |  |  Pro Java 7 NIO.2 (Professional Apress)
The recommended entry point to start exploring the NIO.2 API, also known as “JSR 203: More New I/O
APIs for the Java Platform” (NIO.2), is the new abstract class java.nio.file.Path. This class is a
milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities
of this ... |
|
|
 The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context... |  |  Unity iOS Game Development Beginners Guide
If you are a developer who is interested in developing games for the iOS platform and want
to leverage the Unity platform, this book will provide the core knowledge that you need
to get started. If you are a Unity developer looking to port an existing application to the
mobile platform, this book will give you an overview of the... |  |  IBM DB2 9.7 Advanced Application Developer Cookbook
Welcome to the DB2 9.7 Advanced Application Developer Cookbook. DB2 9.7 is a truly incredible database product from IBM, which offers an excellent mix of application performance, reliability, and ease of development enablement.
In this cookbook, you can find both: hands-on and real world practical application development examples, as well... |
|
 FreeBSD Device Drivers: A Guide for the Intrepid
Welcome to FreeBSD Device Drivers! The goal of this book is to help you improve your understanding of device drivers under FreeBSD. By the time you finish this book, you should be able to build, configure, and manage your own FreeBSD device drivers.
This book covers FreeBSD version 8, the version recommended for production ... |  |  Windows Phone 7.5: Building Location-aware Applications
Windows Phone 7.5: Building Location-aware Applications, introduces you to the exciting
new world of Windows Phone 7.5. This book focuses on location-based applications,
by introducing the readers to location-based services and the background thereof,
coupled with practical examples for the Windows Phone location services. Another... |  |  Programming Hive
Programming Hive introduces Hive, an essential tool in the Hadoop ecosystem that
provides an SQL (Structured Query Language) dialect for querying data stored in the
Hadoop Distributed Filesystem (HDFS), other filesystems that integrate with Hadoop,
such as MapR-FS and Amazon’s S3 and databases like HBase (the ... |
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |