Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SHARKS in the MOAT: How to Create Truly Secure Software
SHARKS in the MOAT: How to Create Truly Secure Software
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how...
Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment

Overview

  • Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
  • ...
Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab

Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!

Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a...

Professional Software Testing with Visual Studio 2005 Team System: Tools for Software Developers and Test Engineers (Programmer to Programmer)
Professional Software Testing with Visual Studio 2005 Team System: Tools for Software Developers and Test Engineers (Programmer to Programmer)
With the introduction of Visual Studio 2005 Team System (VSTS), Microsoft for the first time offers software developers and test engineers a complete and integrated suite of tools for software testing. This authoritative book shares with you best practices for software testing using VSTS test and development tools and covers all phases of the...
MAKE: Electronics: Learning Through Discovery
MAKE: Electronics: Learning Through Discovery
Want to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the...
Mac OS X for Photographers: Optimized image workflow for the Mac user (Digital Workflow)
Mac OS X for Photographers: Optimized image workflow for the Mac user (Digital Workflow)
If you're a photographer using a Mac and why wouldn't you be? then you need this guide to optimizing OS X for your photography workflow.

Macs are still the hardware of choice for the cream of digital imaging experts over two million registered Mac users of Adobe Photoshop can't be wrong. Let the expert advice of Rod Wynne-Powell help
...
BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action)
Extreme NXT: Extending the LEGO MINDSTORMS NXT to the Next Level (Technology in Action)
Extreme NXT: Extending the LEGO MIDSTORMS NXT to the Next Level is for intermediate-level users of NXT who would like to advance their capabilities by learning some of the basics of electronics. Plenty of examples are provided, and easy-to-follow instructions are included for building over 15 different sensors.

This makes a great...

Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit
This is the first fully integrated Penetration Testing book and bootable Linux CD containing the Auditor Security Collection which includes over 300 of the most effective and commonly used open source attack and penetration testing tools. This powerful tool kit and authoritative reference is written by the security industry's foremost...
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
The Agile Samurai: How Agile Masters Deliver Great Software
The Agile Samurai: How Agile Masters Deliver Great Software

Get ready to kick some software project butt. By learning the ways of the agile samurai you will discover:

* how to create plans and schedules your customer and your team can believe in

  • what characteristics make a good agile team and how to form your own

  • ...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy