 |
|
 Coding for Penetration Testers: Building Better Tools
My Dear Reader,
This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting... |  |  The Developer's Code
This is a book for developers of all kinds. However, it has
little to do with code. It doesn’t matter if you program in C#
or Ruby or Python or PHP or Java or JavaScript or Action-
Script. It doesn’t matter whether you’re working on
databases, writing server-side code, or scripting the ... |  |  Jenkins: The Definitive Guide
This book is aimed at relatively technical readers, though no prior experience with
Continuous Integration is assumed. You may be new to Continuous Integration, and
would like to learn about the benefits it can bring to your development team. Or, you
might be using Jenkins or Hudson already, and want to discover how you can... |
|
 The Joy of Clojure: Thinking the Clojure Way
The authors of this book have taken an ambitious and aggressive approach to teaching Clojure. You know how everyone loves to say they teach using the “drinking from a fire hydrant” method? Well, at times it feels like these guys are trying to shove that fire hydrant right up... let’s just say it’s a place... |  |  Domain-Specific Languages (Addison-Wesley Signature Series (Fowler))
When carefully selected and used, Domain-Specific Languages (DSLs) may simplify complex code, promote effective communication with customers, improve productivity, and unclog development bottlenecks. In Domain-Specific Languages, noted software development expert Martin Fowler first provides the information software... |  |  ASP.NET MVC 2 Cookbook
Ten years ago, ASP.NET provided software developers with a means to write complex web applications with their existing Windows Forms skillsets. Today, it continues to be a robust framework for writing scalable applications, from small e-Commerce to enterprise-level CRM. But ten years later, with many business critical applications existing... |
|
 Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition
This book has been developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.
THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS
Thwart malicious network intrusion... |  |  Clever Algorithms: Nature-Inspired Programming Recipes
The need for this project was born of frustration while working towards my
PhD. I was investigating optimization algorithms and was implementing
a large number of them for a software platform called the Optimization
Algorithm Toolkit (OAT)1. Each algorithm required considerable effort
to locate the relevant source material (from... |  |  CoffeeScript: Accelerated JavaScript Development (Pragmatic)
JavaScript was never meant to be the most important programming language
in the world. It was hacked together in ten days, with ideas from Scheme
and Self packed into a C-like syntax. Even its name was an awkward fit,
referring to a language with little in common besides a few keywords.1 But
once JavaScript was released, there was no... |
|
|
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 |