Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions
Migrating to Azure: Transforming Legacy Applications into Scalable Cloud-First Solutions

Design an enterprise solution from scratch that allows the migration of a legacy application. Begin with the planning and design phase and be guided through all the stages of selecting the architecture framework that fits your enterprise.

Join Microsoft MVP Josh Garverick as he addresses all major areas of design and...

Visual Studio Tools for Office: Using C# with Excel, Word, Outlook, and InfoPath
Visual Studio Tools for Office: Using C# with Excel, Word, Outlook, and InfoPath

Visual Studio Tools for Office is both the first and the definitive book on VSTO 2005 programming, written by the inventors of the technology. VSTO is a set of tools that allow professional developers to use the full power of Visual Studio .NET and the .NET Framework to put code behind Excel...

Apache Security
Apache Security

This all-purpose guide for locking down Apache arms readers with all the information they need to securely deploy applications. Administrators and programmers alike will benefit from a concise introduction to the theory of securing Apache, plus a wealth of practical advice and real-life examples. Topics covered include...

Cryptography for Dummies
Cryptography for Dummies

Protect yourself and your business from online eavesdroppers—it’s easier than you think! If you were hoping for a flame-throwing watch or flying a car, we’re sorry—this isn’t James Bond’s equipment manual. Cryptography is a common-sense way to secure stuff on the Internet, and this friendly guidebook makes...

Linux Network Servers (Craig Hunt Linux Library)
Linux Network Servers (Craig Hunt Linux Library)
Authoritative Answers to All Your Linux Network Server Questions—Specifically for Linux Administrators
Tap into Linux's impressive capabilities as a network server. Written by one of the world’s leading Linux system administration experts, Linux Network Servers teaches you,
...
Advanced Software Engineering: Expanding the Frontiers of Software Technology
Advanced Software Engineering: Expanding the Frontiers of Software Technology
This volume presents proceedings from the 19th IFIP World Computer Congress in Santiago, Chile. The proceedings of the World Computer Congress are a product of the gathering of 2,000 delegates from more than 70 countries to discuss a myriad of topics in the ICT domain. Of particular note, this marks the first time that a World Computer Congress has...
MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft® Windows Server(TM) 2003 Network
MCSE Self-Paced Training Kit (Exam 70-298): Designing Security for a Microsoft® Windows Server(TM) 2003 Network

Ace your preparation for the skills measured by MCP Exam 70-298—and on the job—with this official Microsoft study guide. Work at your own pace through a system of lessons, practice exercises, and design activities.

Maximize your performance on the exam by learning how to:

  • Document the impact of business and...
MCSE Self-Paced Training Kit (Exam 70-217): Microsoft  Windows  2000 Active Directory  Services, Second Edition
MCSE Self-Paced Training Kit (Exam 70-217): Microsoft Windows 2000 Active Directory Services, Second Edition

Welcome to the MCSE Training Kit—Microsoft Windows 2000 Active Directory Services. This kit prepares you to install, configure, administer, monitor, and troubleshoot Microsoft Windows 2000 Active Directory.

This kit introduces you to Windows 2000 Active Directory and prepares you to plan, configure, and administer your...

Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Causes of War
Causes of War

Written by leading scholars in the field, Causes of War provides the first comprehensive analysis of the leading theories relating to the origins of both interstate and civil wars.

  • Utilizes historical examples to illustrate individual theories throughout
  • Includes an analysis of theories of civil wars...
unlimited object storage image
Result Page: 377 376 375 374 373 372 371 370 369 368 367 366 365 364 363 362 361 360 359 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy