Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.
Automated Trading with R: Quantitative Research and Platform Development
Learn to trade algorithmically with your existing brokerage, from data management, to strategy optimization, to order execution, using free and publicly available data. Connect to your brokerage’s API, and the source code is plug-and-play.
Automated Trading with R explains automated trading, starting with its...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...
Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset
Many corporations are finding that the size of their data sets are outgrowing the capability of their systems to store and process them. The data is becoming too big to manage and use with traditional tools. The solution: implementing a big data system.
As Big Data Made Easy: A Working...
Penetration Tester's Open Source Toolkit, Third Edition
Penetration testing is often considered an art as much as it is a science, but even an
artist needs the right brushes to do the job well. Many commercial and open source
tools exist for performing penetration testing, but it’s often hard to ensure that you
know what tools are available and which ones to use for a certain task....
The Hacker Playbook: Practical Guide To Penetration Testing
Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...
MAKE: Electronics: Learning Through Discovery
Want to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics
, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then
Hacking Exposed Wireless
Secure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...
Team Foundation Server 2012 Starter
Your quick start guide to TFS 2012, top features, and best practices with hands on examples
Install TFS 2012 from scratch
Get up and running with your first project
Streamline release cycles for maximum productivity
|Result Page: 11 10 9 8 7 6 5 4 3 2 |