Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Lean Python: Learn Just Enough Python to Build Useful Tools
Lean Python: Learn Just Enough Python to Build Useful Tools

Learn only the essential aspects of Python without cluttering up your mind with features you may never use. This compact book is not a "best way to write code" type of book; rather, the author goes over his most-used functions, which are all you need to know as a beginner and some way beyond.

Lean...

Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.

...

The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

FSM-based Digital Design using Verilog HDL
FSM-based Digital Design using Verilog HDL

As digital circuit elements decrease in physical size, resulting in increasingly complex systems, a basic logic model that can be used in the control and design of a range of semiconductor devices is vital. Finite State Machines (FSM) have numerous advantages; they can be applied to many areas (including motor control, and signal and serial...

User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
User Stories Applied: For Agile Software Development (Addison-Wesley Signature Series)
Thoroughly reviewed and eagerly anticipated by the agile community, User Stories Applied offers a requirements process that saves time, eliminates rework, and leads directly to better software.

The best way to build software that meets users' needs is to begin with "user stories": simple, clear, brief descriptions of...

Head First Software Development (Brain-Friendly Guides)
Head First Software Development (Brain-Friendly Guides)
Even the best developers have seen well-intentioned software projects fail -- often because the customer kept changing requirements, and end users didn't know how to use the software you developed. Instead of surrendering to these common problems, let Head First Software Development guide you through the best practices of software...
SQL for Microsoft Access, Second Edition (Wordware Applications Library)
SQL for Microsoft Access, Second Edition (Wordware Applications Library)
SQL for Microsoft Access, Second Edition provides a guide to getting the most out of Microsoft Access through the use of Structured Query Language. Step-by-step examples demonstrate how to use SQL script to create tables, add records to tables, and retrieve and manage records. Readers will also learn about calculated fields, Access projects, and...
Software Testing
Software Testing

Software Testing is the book for new or aspiring software testers interested in learning about this crucial part of the software development process. The complexity and size of today's software makes writing bug-free code extremely difficult, even for highly experienced programmers. Couple that with our increasing reliance on software for...

Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy