Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Hacking Digital Cameras (ExtremeTech)
Hacking Digital Cameras (ExtremeTech)
Why waste a thousand words?

Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole...

Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms

Investigate, analyze, and report iOS, Android, and Windows devices

Key Features

  • Get hands-on experience in performing simple to complex mobile forensics techniques
  • Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected...
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Practical Electronics: Components and Techniques
Practical Electronics: Components and Techniques

How much do you need to know about electronics to create something interesting, or creatively modify something that already exists? If you’d like to build an electronic device, but don’t have much experience with electronics components, this hands-on workbench reference helps you find answers to technical questions...

SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
The definitive exercise book that the one-million-plus readers of the Younger Next Year® series have been waiting for—and the exercise book that takes the intimidation out of starting a workout routine. Based on the science that shows how we can turn back our biological clocks by a combination of aerobics and strength fitness,...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy