Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Web Penetration Testing Cookbook
Python Web Penetration Testing Cookbook

Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing

About This Book

  • Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
  • Find the script you need to deal with any...
Model-Based Software Testing and Analysis with C#
Model-Based Software Testing and Analysis with C#
This book teaches new methods for specifying, analyzing, and testing software; essentials for creating high-quality software. These methods increase the automation in each of these steps, making them more timely, more thorough, and more effective. The authors work through several realistic case studies in-depth and detail, using a toolkit built on...
Jenkins 2: Up and Running: Evolve Your Deployment Pipeline for Next Generation Automation
Jenkins 2: Up and Running: Evolve Your Deployment Pipeline for Next Generation Automation

Design, implement, and execute continuous delivery pipelines with a level of flexibility, control, and ease of maintenance that was not possible with Jenkins before. With this practical book, build administrators, developers, testers, and other professionals will learn how the features in Jenkins 2 let you define pipelines as code,...

Model-Based Software Testing and Analysis with C#
Model-Based Software Testing and Analysis with C#
This book teaches new methods for specifying, analyzing, and testing software; essentials for creating high-quality software. These methods increase the automation in each of these steps, making them more timely, more thorough, and more effective. The authors work through several realistic case studies in-depth and detail, using a toolkit built on...
Succeeding with Use Cases : Working Smart to Deliver Quality (Addison-Wesley Object Technology Series)
Succeeding with Use Cases : Working Smart to Deliver Quality (Addison-Wesley Object Technology Series)

You can dramatically improve software quality and value by integrating use cases with best-practice software quality engineering disciplines.

Richard Denney presents practical, cost-effective techniques that help your entire development organization deliver superior software.

...
Interactive Object-Oriented Programming in Java: Learn and Test Your Programming Skills
Interactive Object-Oriented Programming in Java: Learn and Test Your Programming Skills

Gain the fundamental concepts of object-oriented programming with examples in Java. This second edition comes with detailed coverage and enhanced discussion on fundamental topics such as inheritance, polymorphism, abstract classes, interfaces, and packages. This edition also includes discussions on multithread programming,...

Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset
Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset

Many corporations are finding that the size of their data sets are outgrowing the capability of their systems to store and process them. The data is becoming too big to manage and use with traditional tools. The solution: implementing a big data system.

As Big Data Made Easy: A Working...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

Black & Decker The Complete Guide to Wiring, 5th Edition: Current with 2011-2013 Electrical Codes
Black & Decker The Complete Guide to Wiring, 5th Edition: Current with 2011-2013 Electrical Codes
The world of wiring tends to move in cycles, so to speak. The basic science that causes your blender to whir when you plug the cord into a wall outlet doesn’t change, but the ways we harness and manage electrical power are constantly improving—always with an eye toward safety. The Complete Guide to Wiring changes, too....
Migrating to Swift from Android
Migrating to Swift from Android

In 2000, I started my first PalmOS mobile app for an inventory-tracking project. The initial project was a full-staffed team effort that consisted of mobile developers, SAP consultants, supply-chain subject matter experts, middleware developers, QA testers, architects, business sponsors, and so forth. JavaME came up strong in 2002, followed...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy