Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python

Leverage the simplicity of Python and available libraries to build web security testing tools for your application

Key Features

  • Understand the web application penetration testing methodology and toolkit using Python
  • Write a web crawler/spider with the Scrapy library
  • ...
Hands-On Microservices with Rust: Build, test, and deploy scalable and reactive microservices with Rust 2018
Hands-On Microservices with Rust: Build, test, and deploy scalable and reactive microservices with Rust 2018

A comprehensive guide in developing and deploying high performance microservices with Rust

Key Features

  • Start your microservices journey and get a broader perspective on microservices development using RUST 2018,
  • Build, deploy, and test microservices using AWS
  • ...
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp...
VMware vSphere 6.5 Cookbook - Third Edition: Over 140 task-oriented recipes to install, configure, manage, and orchestrate various VMware vSphere 6.5 components
VMware vSphere 6.5 Cookbook - Third Edition: Over 140 task-oriented recipes to install, configure, manage, and orchestrate various VMware vSphere 6.5 components

Deploy and manage VMware vSphere 6.5 components with ease

Key Features

  • Simplified and to-the-point theory and practical recipes to deploy and manage vSphere 6.5
  • Discover the best ways to deploy stateless and stateful ESXi hosts and upgrade them
  • Storage and...
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale
Cloud-Native Applications in Java: Build microservice-based cloud-native applications that dynamically scale

Highly available microservice-based web apps for Cloud with Java

Key Features

  • Take advantage of the simplicity of Spring to build a full-fledged application
  • Let your applications run faster while generating smaller cloud service bills
  • Integrate your...
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling
Advanced Microservices: A Hands-on Approach to Microservice Infrastructure and Tooling

Use the many types of tools required to navigate and maintain a microservice ecosystem. This book examines what is normally a complex system of interconnected services and clarifies them one at a time, first examining theoretical requirements then looking at concrete tools, configuration, and workflows.

Building out these systems...

Hands-On Reactive Programming with Clojure: Create asynchronous, event-based, and concurrent applications, 2nd Edition
Hands-On Reactive Programming with Clojure: Create asynchronous, event-based, and concurrent applications, 2nd Edition

Learn how to use RxClojure to deal with stateful computations

Key Features

  • Leverage the features of Functional Reactive Programming using Clojure
  • Create dataflow-based systems that are the building blocks of Reactive Programming
  • Use different Functional...
ZeroMQ
ZeroMQ

For C developers who want a comprehensive introduction to ZeroMQ, this is the perfect tutorial. With a user-friendly approach and practical examples, it covers everything from fundamental message patterns to working with multiple sockets.

Overview

  • Learn fundamental message/queue design patterns
  • ...
ITIL Service Operation 2011 Edition (Best Management Practices)
ITIL Service Operation 2011 Edition (Best Management Practices)

The ITIL Editions 2011 has been updated for clarity, consistency, correctness and completeness. By focusing on delivery and control process activities, ITIL Service Operation describes how a highly desirable steady state of managing services can be achieved on a day-to-day basis. Key Features The updated ITIL publications share a similar...

Pro Puppet
Pro Puppet

The lives of system administrators and operations staff often revolve around a series of repetitive tasks: configuring hosts, creating users, and managing applications, daemons, and services. Often these tasks are repeated many times in the life cycle of one host, from building to decommissioning, and as new configuration is added or...

Electrical, Electronics, and Digital Hardware Essentials for Scientists and Engineers
Electrical, Electronics, and Digital Hardware Essentials for Scientists and Engineers

A practical guide for solving real-world circuit board problems

Electrical, Electronics, and Digital Hardware Essentials for Scientists and Engineers arms engineers with the tools they need to test, evaluate, and solve circuit board problems. It explores a wide range of circuit analysis topics, supplementing the...

Result Page: 16 15 14 13 12 11 10 9 8 7 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy