Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Scrapbooking
Digital Scrapbooking
Are you a traditional scrapbook enthusiast looking for a way to organize your memories electronically? Have you never tried scrapbooking because you`re not sure where to start? "Digital Scrapbooking" is here to start you on your journey! Cover the fundamentals of digital photography and digital scrapbook elements, incorporating existing...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset
Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset

Many corporations are finding that the size of their data sets are outgrowing the capability of their systems to store and process them. The data is becoming too big to manage and use with traditional tools. The solution: implementing a big data system.

As Big Data Made Easy: A Working...

Developing RESTful Web Services with Jersey 2.0
Developing RESTful Web Services with Jersey 2.0

Learn how to design and implement a test automation framework block by block

Overview

  • A simple and easy demonstration of the important concepts will enable you to translate abstract ideas into practice
  • Each chapter begins with an outline and a brief statement of content to help the reader...
How to Cheat in Photoshop Elements 6: Create stunning photomontages on a budget
How to Cheat in Photoshop Elements 6: Create stunning photomontages on a budget
Full of quirky tips and tricks for fun and creative image manipulation in Elements!

How to Cheat in Elements 6 is an invaluable resource for all users of Photoshop Elements and shows you how to 'cheat' by sharing insider secrets from clever and cunning Elements gurus, David Asch and series forerunner, Steve
...
Penetration Tester's Open Source Toolkit, Third Edition
Penetration Tester's Open Source Toolkit, Third Edition

Penetration testing is often considered an art as much as it is a science, but even an artist needs the right brushes to do the job well. Many commercial and open source tools exist for performing penetration testing, but it’s often hard to ensure that you know what tools are available and which ones to use for a certain task....

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

How to Use Adobe Photoshop CS2
How to Use Adobe Photoshop CS2

Have you ever looked at your color pictures and wished you could make them black and white? Or maybe you've dreamed about taking that photo of your brother, cutting the head off and placing it on the body of a grizzly bear. The tool that you need is Adobe Photoshop and the book you need to learn all about it is ...

A Tester's Guide to .NET Programming
A Tester's Guide to .NET Programming
Today’s software testing environment has changed. A common trend we are seeing these days is
advertisements for software developers and testers that look virtually the same. Today, companies
all seem to require software test professionals with in-depth knowledge of programming languages
and with significant database skills.
...
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy