Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Learn Rails 5.2: Accelerated Web Development with Ruby on Rails
Learn Rails 5.2: Accelerated Web Development with Ruby on Rails
Learn to build Rails-based web applications using all the latest features offered in Rails 5.2. Author Stefan Wintermeyer begins by teaching the basics of Ruby 2.5 before proceeding through all aspects of Rails, utilizing clean, succinct examples – rather than a single large...
Rust Programming By Example: Enter the world of Rust by building engaging, concurrent, reactive, and robust applications
Rust Programming By Example: Enter the world of Rust by building engaging, concurrent, reactive, and robust applications

Discover the world of Rust programming through real-world examples

Key Features

  • Implement various features of Rust to build blazingly fast applications
  • Learn to build GUI applications using Gtk-rs
  • Explore the multi-threading aspect of Rust to tackle...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Ruby Data Processing: Using Map, Reduce, and Select
Ruby Data Processing: Using Map, Reduce, and Select
Gain the basics of Ruby’s map, reduce, and select functions and discover how to use them to solve data-processing problems. This compact hands-on book explains how you can encode certain complex programs in 10 lines of Ruby code, an astonishingly small number. You will walk through problems and solutions which are effective...
Beginning Scala
Beginning Scala

Beginning Scala, Second Edition takes a down-to-earth approach to teaching Scala that leads you through simple examples that can be combined to build complex, scalable systems and applications.

This book introduces you to the Scala programming language, its object-oriented and functional programming characteristics, and...

Serverless Single Page Apps: Fast, Scalable, and Available
Serverless Single Page Apps: Fast, Scalable, and Available

Don't waste your time building an application server. See how to build low-cost, low-maintenance, highly available, serverless single page web applications that scale into the millions of users at the click of a button. Quickly build reliable, well-tested single page apps that stay up and running 24/7 using Amazon Web Services. Avoid...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Seven Web Frameworks in Seven Weeks: Adventures in Better Web Apps (Pragmatic Programmers)
Seven Web Frameworks in Seven Weeks: Adventures in Better Web Apps (Pragmatic Programmers)

Whether you need a new tool or just inspiration, Seven Web Frameworks in Seven Weeks explores modern options, giving you a taste of each with ideas that will help you create better apps. You'll see frameworks that leverage modern programming languages, employ unique architectures, live client-side instead of server-side, or embrace...

RubyMotion: iOS Development with Ruby (The Pragmatic Programmers)
RubyMotion: iOS Development with Ruby (The Pragmatic Programmers)

Make beautiful apps with beautiful code: use the elegant and concise Ruby programming language with RubyMotion to write truly native iOS apps with less code while having more fun. You'll learn the essentials of creating great apps, and by the end of this book, you'll have built a fully functional API-driven app. Whether you're a...

Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.

...

Result Page: 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy