Home | Amazing | Today | Tags | Publishers | Years | Search 
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Python GUI Programming with Tkinter: Develop responsive and powerful GUI applications with Tkinter
Python GUI Programming with Tkinter: Develop responsive and powerful GUI applications with Tkinter

Find out how to create visually stunning and feature-rich applications by empowering Python's built-in Tkinter GUI toolkit

Key Features

  • Explore Tkinter's powerful features to easily design and customize your GUI application
  • Learn the basics of 2D and 3D animation...
Serverless Architectures with AWS: Discover how you can migrate from traditional deployments to serverless architectures with AWS
Serverless Architectures with AWS: Discover how you can migrate from traditional deployments to serverless architectures with AWS

Don't waste your energy thinking about servers; use AWS to build enterprise-grade serverless applications.

Key Features

  • Learn how to quickly and easily go serverless
  • Explore AWS and Lambda: the first building blocks of serverless applications on AWS
  • ...
MongoDB 4 Quick Start Guide: Learn the skills you need to work with the world's most popular NoSQL database
MongoDB 4 Quick Start Guide: Learn the skills you need to work with the world's most popular NoSQL database

A fast paced guide that will help you to create, read, update and delete data using MongoDB

Key Features

  • Create secure databases with MongoDB
  • Manipulate and maintain your database
  • Model and use data in a No SQL environment with MongoDB

...

Python Data Analysis
Python Data Analysis

Key Features

  • Find, manipulate, and analyze your data using the Python 3.5 libraries
  • Perform advanced, high-performance linear algebra and mathematical calculations with clean and efficient Python code
  • An easy-to-follow guide with realistic examples that are frequently used in real-world data...
Oracle 10g Database Administration Concepts & Implementation Made Simple
Oracle 10g Database Administration Concepts & Implementation Made Simple

The Topics Covered In This Book Are: Visualizing the Complete Oracle Environment, SQL: Structured Query Language, Oracle Database Concepts, Oracle Instance Concepts, Oracle in Action, Complete Oracle System Design: Steps of Implementation, Oracle Database Design, Oracle Network Administration, Oracle Database Management, Oracle Backup &...

CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice...

Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)
The Rails 5 Way (4th Edition) (Addison-Wesley Professional Ruby Series)

The “Bible” for Rails Development: Fully Updated for Rails 5

 

“When I read The Rails Way for the first time, I felt like I truly understood Rails for the first time.”

...
Rails AntiPatterns: Best Practice Ruby on Rails Refactoring (Addison-Wesley Professional Ruby Series)
Rails AntiPatterns: Best Practice Ruby on Rails Refactoring (Addison-Wesley Professional Ruby Series)
The Complete Guide to Avoiding and Fixing Common Rails 3 Code and Design Problems

As developers worldwide have adopted the powerful Ruby on Rails web framework, many have fallen victim to common mistakes that reduce code quality, performance, reliability, stability, scalability, and maintainability.
...
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of...
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Result Page: 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 301 300 299 298 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy