Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Complex and Revision Shoulder Arthroplasty: An Evidence-Based Approach to Evaluation and Management
Complex and Revision Shoulder Arthroplasty: An Evidence-Based Approach to Evaluation and Management
This practical text presents the most up-to-date information on the evaluation and management of all aspects of complex and revision shoulder arthroplasty, divided into three thematic section. Chapters in part I focus on the diagnosis and management of complex primary shoulder arthroplasty, including evaluation of humeral and glenoid bone...
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov chains are a particularly powerful and widely used tool for analyzing a variety of stochastic (probabilistic) systems over time. This monograph will present a series of Markov models, starting from the basic models and then building up to higher-order models. Included in the higher-order discussions are multivariate models, higher-order...
DNS and BIND, Fourth Edition
DNS and BIND, Fourth Edition
The fourth edition of DNS and BIND covers the new 9.1.0 and 8.2.3 versions of BIND as well as the older 4.9 version. There's also more extensive coverage of NOTIFY, IPv6 forward and reverse mapping, transaction signatures, and the new DNS Security Extensions; and a section on accommodating Windows 2000 clients,...
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
The Esoteric Investor: Alternative Investments for Global Macro Investors
The Esoteric Investor: Alternative Investments for Global Macro Investors

Massive demographic, environmental, economic, and regulatory shifts are generating huge new investment opportunities with an exceptionally high probability of success over the coming years and decades. In The Esoteric Investor, a world-class portfolio manager identifies these investments, and shows how your best...

Oracle GoldenGate 12c Implementer's Guide
Oracle GoldenGate 12c Implementer's Guide

Leverage the power of real-time data access for designing, building, and tuning your GoldenGate Enterprise

About This Book

  • Orchestrate the rich features of GoldenGate 12c and exploit the performance-enhancing features and manageability in your Enterprise environment
  • Master data...
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)
Database Design Using Entity-Relationship Diagrams (Foundations of Database Design)

Essential to database design, entity-relationship (ER) diagrams are known for their usefulness in mapping out clear database designs. They are also well-known for being difficult to master. With Database Design Using Entity-Relationship Diagrams, Second Edition, database designers, developers, and students preparing...

SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
The definitive exercise book that the one-million-plus readers of the Younger Next Year® series have been waiting for—and the exercise book that takes the intimidation out of starting a workout routine. Based on the science that shows how we can turn back our biological clocks by a combination of aerobics and strength fitness,...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy