Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Computational Line Geometry (Mathematics and Visualization)
Computational Line Geometry (Mathematics and Visualization)

The geometry of lines occurs naturally in such different areas as sculptured surface machining, computation of offsets and medial axes, surface reconstruction for reverse engineering, geometrical optics, kinematics and motion design, and modeling of developable surfaces. This book covers line geometry from various viewpoints and aims towards...

SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
The definitive exercise book that the one-million-plus readers of the Younger Next Year® series have been waiting for—and the exercise book that takes the intimidation out of starting a workout routine. Based on the science that shows how we can turn back our biological clocks by a combination of aerobics and strength fitness,...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Information Security : Principles and Practice
Information Security : Principles and Practice
Your expert guide to information security

As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not...

20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)

Transform Average Employees into Powerhouse Performers

“I cannot think of a more important message and timely book. 20 Minutes to a Top Performer offers quick, simple techniques for managers to improve their effectiveness in communicating with their teams.”
Steven Fine, vice president for
...

Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
Fool-Proof Marketing: 15 Winning Methods for Selling Any Product or Service in Any Economy
Fool-Proof Marketing: 15 Winning Methods for Selling Any Product or Service in Any Economy
As I mentioned, an old saying informs us, “It’s not what happens to you; it’s how you handle it.” Nowhere is that truer than during a business crisis, slump, or downturn.

Of the 15 fool-proof business strategies presented in this book, none are more important than the personal strategies presented in Part I. The
...
Automated Database Applications Testing: Specification Representation for Automated Reasoning
Automated Database Applications Testing: Specification Representation for Automated Reasoning

This book introduces SpecDB, an intelligent database created to represent and host software specifications in a machine-readable format, based on the principles of artificial intelligence and unit testing database operations. SpecDB is demonstrated via two automated intelligent tools. The first automatically generates database constraints...

Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution
Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution

The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information systems running today in many organizations were developed many years ago with technologies that are now obsolete. These old systems, known as legacy...

Result Page: 15 14 13 12 11 10 9 8 7 6 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy