Home | Amazing | Today | Tags | Publishers | Years | Search 
Developing RESTful Web Services with Jersey 2.0
Developing RESTful Web Services with Jersey 2.0

Learn how to design and implement a test automation framework block by block

Overview

  • A simple and easy demonstration of the important concepts will enable you to translate abstract ideas into practice
  • Each chapter begins with an outline and a brief statement of content to help the reader...
Improving the Test Process: Implementing Improvement and Change - A Study Guide for the ISTQB Expert Level Module (Rocky Nook Computing)
Improving the Test Process: Implementing Improvement and Change - A Study Guide for the ISTQB Expert Level Module (Rocky Nook Computing)

This book covers the syllabus for the Improving the Test Process module of the International Software Testing Qualifications Board (ISTQB) Expert Level exam.

To obtain certification as a professional tester at the Expert Level, candidates may choose to take a course given by an ISTQB accredited training provider and then sit
...

Mastering Metasploit
Mastering Metasploit

With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
Overview

  • Develops Real World Approaches to Penetration testing using Metasploit
  • ...
Hudson 3 Essentials
Hudson 3 Essentials

Here is a book that makes life easier for Java developers or administrators by teaching you how to automate application testing using Hudson 3. Fast-paced and hands-on, the guide covers everything from installation to writing plugins.

Overview

  • A practical guide that will teach you how to deploy Hudson 3...
Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Automated Trading with R: Quantitative Research and Platform Development
Automated Trading with R: Quantitative Research and Platform Development

Learn to trade algorithmically with your existing brokerage, from data management, to strategy optimization, to order execution, using free and publicly available data. Connect to your brokerage’s API, and the source code is plug-and-play.

Automated Trading with R explains automated trading, starting with its...

Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Advanced Penetration Testing for Highly-Secured Environments - Second Edition

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments

About This Book

  • Learn how to build your own pentesting lab environment to practice advanced techniques
  • Customize your own scripts, and learn methods to exploit 32-bit and 64-bit...
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Team Foundation Server 2012 Starter
Team Foundation Server 2012 Starter

Your quick start guide to TFS 2012, top features, and best practices with hands on examples

Overview

  • Install TFS 2012 from scratch
  • Get up and running with your first project
  • Streamline release cycles for maximum productivity

In Detail

Team...

Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy