Home | Amazing | Today | Tags | Publishers | Years | Search 
Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
How to Cheat at Configuring VmWare ESX Server
How to Cheat at Configuring VmWare ESX Server
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine...
Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other,...
The Official Damn Small Linux(R) Book: The Tiny Adaptable Linux(R) That Runs on Anything (Negus Live Linux Series)
The Official Damn Small Linux(R) Book: The Tiny Adaptable Linux(R) That Runs on Anything (Negus Live Linux Series)
Damn Small Linux (DSL) started as an exercise by John Andrews to fit an entire desktop computer system into a compressed 50MB image. Within a few years, DSL grew to one of the most popular Linux systems in the world (in the Top Ten, by some accounts) without growing beyond that 50MB target.

In a world where desktop systems are...

Visual Basic.NET and XML: Harness the Power of XML in VB.NET Applications
Visual Basic.NET and XML: Harness the Power of XML in VB.NET Applications

Microsoft envisions a future where the Web will host millions of distributed applications all communications via XML. Data packaged in XL will flow to and from databases, between applications, and directly to the browser.

With the release of Visual Basic .NET, XML support is tightly integrated into the language and provides numerous...

Real-time 3D Character Animation with Visual C++ (Book & CD-ROM)
Real-time 3D Character Animation with Visual C++ (Book & CD-ROM)
Do you have some experience and a reasonable knowledge of C++ and want to write your own computer games? Have you ever looked at a PC or Playstation (R) game with characters running and leaping through an exciting landscape and wondered how it was done? If so then this book will give you all the information you need to achieve this goal, whether...
Inside LightWave v9
Inside LightWave v9
You hold in your hands the best-selling guide to NewTek's LightWave 3D animation software, completely updated for LightWave v9 by award-winning animator and trainer Dan Ablan. Rather than rehash the documentation like other books, this down-to-earth, easy-to-follow guide offers an invaluable set of project tutorials that teach you the ins and...
iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
iPhone Open Application Development: Write Native Objective-C Applications for the iPhone
Certain technologies bring out everyone's hidden geek, and iPhone did the moment it was released. Even though Apple created iPhone as a closed device, tens of thousands of developers bought them with the expressed purpose of designing and running third-party software. In this clear and concise book, veteran hacker Jonathan Zdziarski -- one of the...
Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
The Sun™ ONE Messaging Server Practices and Techniques for Enterprise Customers book is published under the auspices of the Sun BluePrints™ program. This book is a collection of practices and techniques for deploying a messaging system. These practices and techniques have been gathered from many...
Handbook of Research on Public Information Technology
Handbook of Research on Public Information Technology
The use of information technology in the public sector has been an increasingly prominent international trend. With this rapid expansion comes many issues, challenges, and concerns relating to the application of public information technology.

The Handbook of Research of Public Information Technology compiles estimable research...

Pro VB 2008 and the .NET 3.5 Platform (Windows.Net)
Pro VB 2008 and the .NET 3.5 Platform (Windows.Net)
Whether you’re moving to .NET for the first time, or you’re already writing applications on .NET 2.0 or .NET 3.0, Pro VB 2008 and the .NET 3.5 Platform will provide you with a solid grounding in this new technology and serve as a comprehensive reference throughout your coding career:
  • Explore five new...
Result Page: 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy