 |
|
 Penetration Testing with Perl
Harness the power of Perl to perform professional penetration testing
About This Book
-
Write your own custom information security tools using Perl and object-oriented Perl modules
-
Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
- ...
|  |  Learning Python Design Patterns
Written for intermediate Python programmers, this excellent tutorial will help streamline your work through the use of Design Patterns. You'll learn through example and clear explanations to expand your know-how and speed up your output.
Overview
-
Explore the Model-View-Controller pattern and learn how...
|  |  PostgreSQL Server Programming - Second Edition
Extend PostgreSQL using PostgreSQL server programming to create, test, debug, and optimize a range of user-defined functions in your favorite programming language
About This Book
-
Acquaint yourself with all the options to extend PostgreSQL using the programming language of your choice such as C++ and...
|
|
|
 |  |  |  |  Practical Linux Security Cookbook
Key Features
-
This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
-
More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
-
Enhance file system security and local and remote
... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |