Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Hacking Digital Cameras (ExtremeTech)
Hacking Digital Cameras (ExtremeTech)
Why waste a thousand words?

Photos tell stories. And the more you can do with your digital camera, the better the story you can tell. So build a remote control and sneak up on that picture that keeps eluding you. Create an adapter that lets you use SLR-type lenses on your point-and-shoot. Play with lens magnification or create a pinhole...

iOS 5 Core Frameworks: Develop and Design: Working with graphics, location, iCloud, and more
iOS 5 Core Frameworks: Develop and Design: Working with graphics, location, iCloud, and more

Everyone seems to have an opinion as to why their favorite mobile platform is better than the others. Some prefer iOS, others choose Android—each platform has its pros and cons. For me, however, iOS stands above the rest in large part due to its use of powerful native frameworks.

Sure, frameworks and...

Complex and Revision Shoulder Arthroplasty: An Evidence-Based Approach to Evaluation and Management
Complex and Revision Shoulder Arthroplasty: An Evidence-Based Approach to Evaluation and Management
This practical text presents the most up-to-date information on the evaluation and management of all aspects of complex and revision shoulder arthroplasty, divided into three thematic section. Chapters in part I focus on the diagnosis and management of complex primary shoulder arthroplasty, including evaluation of humeral and glenoid bone...
The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

DNS and BIND, Fourth Edition
DNS and BIND, Fourth Edition
The fourth edition of DNS and BIND covers the new 9.1.0 and 8.2.3 versions of BIND as well as the older 4.9 version. There's also more extensive coverage of NOTIFY, IPv6 forward and reverse mapping, transaction signatures, and the new DNS Security Extensions; and a section on accommodating Windows 2000 clients,...
Put Option Strategies for Smarter Trading: How to Protect and Build Capital in Turbulent Markets
Put Option Strategies for Smarter Trading: How to Protect and Build Capital in Turbulent Markets

Use Puts to Mitigate Risk, Reverse and Offset Losses, and Protect Profits–Even in Plummeting Markets!

 

“In these financial times, this is an especially timely book. Michael C. Thomsett provides practical, direct instruction to...

Inflammation, Advancing Age and Nutrition: Research and Clinical Interventions
Inflammation, Advancing Age and Nutrition: Research and Clinical Interventions

The book provides a comprehensive overview to understanding the integrated impact of the concepts of cellular and molecular aspects, models, environmental factors, and lifestyle involved in premature aging. Additionally, it examines how functional food, dietary nutraceuticals or pharmacological compounds can reverse inflammation and premature...

Telecommunications Challenges In Developing Countries: Asymmetric Interconnection Charges For Rural Areas
Telecommunications Challenges In Developing Countries: Asymmetric Interconnection Charges For Rural Areas
Telecommunications Challenges in Developing Countries addresses an important aspect of interconnection—the settings of call termination charges. In rural telecommunications, network costs are known to be high. The traditional consensus has been that many rural areas cannot be connected without subsidies. This paper investigates the...
iOS Penetration Testing: A Definitive Guide to iOS Security
iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure. 

When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to
...
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov Chains: Models, Algorithms and Applications (International Series in Operations Research & Management Science)
Markov chains are a particularly powerful and widely used tool for analyzing a variety of stochastic (probabilistic) systems over time. This monograph will present a series of Markov models, starting from the basic models and then building up to higher-order models. Included in the higher-order discussions are multivariate models, higher-order...
DNS and BIND on IPv6
DNS and BIND on IPv6

I’m sorry for writing this ebook.

Well, that’s not quite accurate. What I mean is, I’m sorry I didn’t have time to update DNS and BIND to include all this new IPv6 material. DNS and BIND deserves a sixth edition, but I’m afraid my schedule is so hectic right now that I just don’t have time to...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy