Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp...
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Mastering PowerShell
Mastering PowerShell

Master the art of automating and managing your Windows environment using PowerShell

About This Book

  • Construct scripts by following proven best practices to automate redundant tasks
  • Delve into real-world examples to understand how to simplify the management of your Windows environment
  • ...
SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

Pro Vim
Pro Vim

Pro Vim teaches you the real-world workflows, tips, and tricks of this powerful, terminal-based text editor. This book covers all the essentials, as well as lesser-known but equally powerful features that will ensure you become a top-level performant and professional user, able to jump between multiple sessions while manipulating and...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Go Web Development Cookbook: Build full-stack web applications with Go
Go Web Development Cookbook: Build full-stack web applications with Go

86 recipes on how to build fast, scalable, and powerful web services and applications with Go

Key Features

  • Become proficient in RESTful web services
  • Build scalable, high-performant web applications in Go
  • Get acquainted with Go frameworks for web...
Cisco Voice Gateways and Gatekeepers
Cisco Voice Gateways and Gatekeepers
Deployments of voice over IP (VoIP) networks continue at a rapid pace. Voice gateways are an essential part of VoIP networks, handling the many tasks involved in translating between transmission formats and protocols and acting as the interface between an IP telephony network and the PSTN or PBX. Gatekeepers and IP-to-IP gateways help these...
CEH Certified Ethical Hacker Study Guide
CEH Certified Ethical Hacker Study Guide

Prepare for the new version of CEH certification with this advanced guide

Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this...

Getting Started with PowerShell
Getting Started with PowerShell

Learn the fundamentals of PowerShell to build reusable scripts and functions to automate administrative tasks with Windows

About This Book

  • Harness the capabilities of the PowerShell system to get started quickly with server automation
  • Learn to package commands into a reusable script and...
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
—Henning Schulzrinne, Professor, Columbia University

Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust...

Result Page: 27 26 25 24 23 22 21 20 19 18 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy