Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
SQL Cookbook
SQL Cookbook

You know the rudiments of the SQL query language, yet you feel you aren't taking full advantage of SQL's expressive power. You'd like to learn how to do more work with SQL inside the database before pushing data across the network to your applications. You'd like to take your SQL skills to the next level.

...
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)

Transform Average Employees into Powerhouse Performers

“I cannot think of a more important message and timely book. 20 Minutes to a Top Performer offers quick, simple techniques for managers to improve their effectiveness in communicating with their teams.”
Steven Fine, vice president for
...

Fool-Proof Marketing: 15 Winning Methods for Selling Any Product or Service in Any Economy
Fool-Proof Marketing: 15 Winning Methods for Selling Any Product or Service in Any Economy
As I mentioned, an old saying informs us, “It’s not what happens to you; it’s how you handle it.” Nowhere is that truer than during a business crisis, slump, or downturn.

Of the 15 fool-proof business strategies presented in this book, none are more important than the personal strategies presented in Part I. The
...
Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering

Sometimes, the best way to advance is in reverse

If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so...

Eclipse Cookbook
Eclipse Cookbook
Eclipse is a powerful open source platform that gives Java developers a new way to approach development projects. In the Eclipse Cookbook, Java expert Steve Holzner demystifies Eclipse with practical recipes for more than 800 situations you may encounter--from deploying a web application automatically to...
Oracle GoldenGate 12c Implementer's Guide
Oracle GoldenGate 12c Implementer's Guide

Leverage the power of real-time data access for designing, building, and tuning your GoldenGate Enterprise

About This Book

  • Orchestrate the rich features of GoldenGate 12c and exploit the performance-enhancing features and manageability in your Enterprise environment
  • Master data...
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems

Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed by the NSA project

Key Features

  • Make the most of Ghidra on different platforms such as Linux, Windows, and macOS
  • Leverage a variety of...
Building Web and Mobile ArcGIS Server Applications with JavaScript
Building Web and Mobile ArcGIS Server Applications with JavaScript

Improve your knowledge and career prospects in web or mobile application development with this step-by-step practical guide to ArcGIS Server. Gives a good grounding in everything from creating maps to network analysis.

Overview

  • Develop ArcGIS Server applications with JavaScript, both for traditional web...
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy