Home | Amazing | Today | Tags | Publishers | Years | Search 
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Hands-On System Programming with C++: Build performant and concurrent Unix and Linux systems with C++17
Hands-On System Programming with C++: Build performant and concurrent Unix and Linux systems with C++17

A hands-on guide to making system programming with C++ easy

Key Features

  • Write system-level code leveraging C++17
  • Learn the internals of the Linux Application Binary Interface (ABI) and apply it to system programming
  • Explore C++ concurrency to take...
Modern C++: Efficient and Scalable Application Development: Leverage the modern features of C++ to overcome difficulties in various stages of application development
Modern C++: Efficient and Scalable Application Development: Leverage the modern features of C++ to overcome difficulties in various stages of application development

Create apps in C++ and leverage its latest features using modern programming techniques.

Key Features

  • Develop strong C++ skills to build a variety of applications
  • Explore features of C++17, such as containers, algorithms, and threads
  • Grasp the standard...
The Modern C++ Challenge: Become an expert programmer by solving real-world problems
The Modern C++ Challenge: Become an expert programmer by solving real-world problems

Test your C++ programming skills by solving real-world programming problems covered in the book

Key Features

  • Solve a variety of real-world programming and logic problems by leveraging the power of C++17
  • Test your skills in using language features, algorithms, data...
Go Standard Library Cookbook: Over 120 specific ways to make full use of the standard library components in Golang
Go Standard Library Cookbook: Over 120 specific ways to make full use of the standard library components in Golang

Implement solutions by leveraging the power of the GO standard library and reducing dependency on external crates

Key Features

  • Develop high quality, fast and portable applications by leveraging the power of Go Standard Library.
  • Practical recipes that will help you work...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Go Web Development Cookbook: Build full-stack web applications with Go
Go Web Development Cookbook: Build full-stack web applications with Go

86 recipes on how to build fast, scalable, and powerful web services and applications with Go

Key Features

  • Become proficient in RESTful web services
  • Build scalable, high-performant web applications in Go
  • Get acquainted with Go frameworks for web...
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang
Hands-On System Programming with Go: Build modern and concurrent applications for Unix and Linux systems using Golang

Explore the fundamentals of systems programming starting from kernel API and filesystem to network programming and process communications

Key Features

  • Learn how to write Unix and Linux system code in Golang v1.12
  • Perform inter-process communication using pipes, message...
Python Penetration Testing Essentials
Python Penetration Testing Essentials

Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • ...
Node.js in Action
Node.js in Action

Summary

Node.js in Action is an example-driven tutorial that starts at square one and guides you through all the features, techniques, and concepts you'll need to build production-quality Node applications. You'll start by learning how to set up your Node development environment, including loading...

Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...

Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy