Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Blitzkrieg: From the Ground Up
Blitzkrieg: From the Ground Up

An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.

The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied
...

Learn Java the Easy Way: A Hands-On Introduction to Programming
Learn Java the Easy Way: A Hands-On Introduction to Programming

Java is the world’s most popular programming language, but it’s known for having a steep learning curve. Learn Java the Easy Way takes the chore out of learning Java with hands-on projects that will get you building real, functioning apps right away.

You’ll start by familiarizing yourself
...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)
Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)

Use This Information To Avoid Being Spied By The Government Today!

If you’ve ever heard outrageous stories about online illegal drug stores, hit men for hire, celebrities busted for child porn, mad scientific experiments, and Illuminati rituals, you’ve probably heard of the “dark web”, alternatively called...

Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Python Interviews: Discussions with Python Experts
Python Interviews: Discussions with Python Experts

Mike Driscoll takes you on a journey talking to a hall-of-fame list of truly remarkable Python experts. You'll be inspired every time by their passion for the Python language, as they share with you their experiences, contributions, and careers in Python.

Key Features

  • Hear from these...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Two Scoops of Django: Best Practices For Django 1.5
Two Scoops of Django: Best Practices For Django 1.5

Update!

The third edition, Two Scoops of Django: Best Practices For Django 1.8 is available! Revised and expanded to 532 pages, it's a whole new book full of new material. Please consider it before purchasing this edition!

http://www.amazon.com/Two-Scoops-Django-Best-Practices/dp/0981467342

...
C Programming - A Beginner's Course
C Programming - A Beginner's Course
Comments posted online for C Programming – A Beginner's Course: "The text does a great job of explaining concepts and the examples are pretty good." "It covers a lot of ideas and concepts that are left out of the other beginner books." "This book does such a good job at explaining the fundamentals of the...
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy