Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Design Patterns in C#: A Hands-on Guide with Real-World Examples
Design Patterns in C#: A Hands-on Guide with Real-World Examples
Get hands-on experience with each Gang of Four design pattern using C#. For each of the patterns, you’ll see at least one real-world scenario, a coding example, and a complete implementation including output.

In the first part of Design Patterns in C#, you will cover the 23 Gang of Four (GoF) design...
Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Developing Turn-Based Multiplayer Games: with GameMaker Studio 2 and NodeJS
Create your first turn-based multiplayer game using GameMaker Studio 2’s built-in networking functions as well as using a simple NodeJS server. This book introduces you to the complexities of network programming and communication, where the focus will be on building the game from the ground up.  You will...
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Go Web Development Cookbook: Build full-stack web applications with Go
Go Web Development Cookbook: Build full-stack web applications with Go

86 recipes on how to build fast, scalable, and powerful web services and applications with Go

Key Features

  • Become proficient in RESTful web services
  • Build scalable, high-performant web applications in Go
  • Get acquainted with Go frameworks for web...
NHibernate in Action
NHibernate in Action
In the classic style of Manning's "In Action" series, NHibernate in Action shows .NET developers how to use the NHibernate Object/Relational Mapping tool. This book is a translation from Java to .NET, as well as an expansion, of Manning's bestselling Hibernate in Action. All traces of Java have been carefully replaced by their .NET...
Pro Vim
Pro Vim

Pro Vim teaches you the real-world workflows, tips, and tricks of this powerful, terminal-based text editor. This book covers all the essentials, as well as lesser-known but equally powerful features that will ensure you become a top-level performant and professional user, able to jump between multiple sessions while manipulating and...

Cisco Unity Fundamentals
Cisco Unity Fundamentals

A comprehensive introduction to deploying, configuring, and maintaining Cisco Unity

  • Discover the various Cisco Unity integration and deployment solutions, as well as the environmental differences between PBX and IP telephony-based telephone systems

  • ...
ASP in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))
ASP in a Nutshell: A Desktop Quick Reference (In a Nutshell (O'Reilly))

ASP in a Nutshell provides the high-quality reference documentation that web application developers really need to create effective Active Server Pages. It focuses on how features are used in a real application and highlights little-known or undocumented features.This book also includes an overview of the interaction between...

Enterprise JavaBeans 3.1
Enterprise JavaBeans 3.1

Learn how to code, package, deploy, and test functional Enterprise JavaBeans with the latest edition of this bestselling guide. Written by the developers of JBoss EJB 3.1, this book not only brings you up to speed on each component type and container service in this implementation, it also provides a workbook with several hands-on...

Cisco Voice Gateways and Gatekeepers
Cisco Voice Gateways and Gatekeepers
Deployments of voice over IP (VoIP) networks continue at a rapid pace. Voice gateways are an essential part of VoIP networks, handling the many tasks involved in translating between transmission formats and protocols and acting as the interface between an IP telephony network and the PSTN or PBX. Gatekeepers and IP-to-IP gateways help these...
Result Page: 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy