Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Arduino Workshop: A Hands-On Introduction with 65 Projects
Arduino Workshop: A Hands-On Introduction with 65 Projects

Learn the Basics, Build the Projects, Create Your Own
 

The Arduino is a cheap, flexible, open source microcontroller platform designed to make it easy for hobbyists to use electronics in homemade projects. With an almost unlimited range of input and output add-ons, sensors, indicators, displays,...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Pro SharePoint 2010 Development for Office 365
Pro SharePoint 2010 Development for Office 365
Welcome to the world of customization and development for SharePoint Online in Office 365. Although Office 365 offers lots of opportunities for businesses and developers, it also represents a different development and deployment paradigm from what most SharePoint developers are accustomed to in a traditional on-premise environment....
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Buying at the Point of Maximum Pessimism: Six Value Investing Trends from China to Oil to Agriculture
Buying at the Point of Maximum Pessimism: Six Value Investing Trends from China to Oil to Agriculture

“Sir John’s ability to comprehend complex concepts and distill these into money-making ideas for his investors was legendary. With this book, Scott Phillips extends Sir John Templeton’s crystal clear vision to some of tomorrow’s most interesting and powerful money-making opportunities. All readers...

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Professional Python
Professional Python

Master the secret tools every Python programmer needs to know

Professional Python goes beyond the basics to teach beginner- and intermediate-level Python programmers the little-known tools and constructs that build concise, maintainable code. Design better architecture and write easy-to-understand code using highly...

Angels Don't Play This haarp: Advances in Tesla Technology
Angels Don't Play This haarp: Advances in Tesla Technology
The U. S. Government has a new ground-based "Star Wars" weapon which is being tested in the remote bush country of Alaska. This new system manipulates the environment in a way which can:

• Disrupt human mental processes.
• Jam all global communications systems.
• Change weather patterns over large
...
You Can Do It!: A Beginners Introduction to Computer Programming
You Can Do It!: A Beginners Introduction to Computer Programming
You’ll be Programming with C++ within the hour

Find out just how easy it is to write computer programs!

Want to start programming but don't know where to start? Don't worry! With a radically different approach to programming, author Francis Glassborow demystifies programming concepts, and...

The Complete Manual of Typography: A Guide to Setting Perfect Type (2nd Edition)
The Complete Manual of Typography: A Guide to Setting Perfect Type (2nd Edition)

Note to customers: The print version of this book is highly formatted, and many pages contain examples that use a variety of approaches to text layout including the use of multiple fonts. The subtleties of this layout would be lost when converted to ePub, so we have chosen to offer this ebook only in PDF format, which keeps the page...

Result Page: 30 29 28 27 26 25 24 23 22 21 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy