Big Data Made Easy: A Working Guide to the Complete Hadoop Toolset
Many corporations are finding that the size of their data sets are outgrowing the capability of their systems to store and process them. The data is becoming too big to manage and use with traditional tools. The solution: implementing a big data system.
As Big Data Made Easy: A Working...
Metasploit Penetration Testing Cookbook
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...
Protecting Your Mobile App IP: The Mini Missing Manual
Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security...
A Practical Guide to Azure DevOps: Learn by doing - Third Edition
DevOps has become a major topic for developers, testers, project managers and many others involved in building software products. Microsoft has introduced Azure DevOps as their tool for implementing DevOps practices.
This book is intended to provide the reader a step-by-step, easy to follow guide...
Python Web Penetration Testing Cookbook
Over 60 indispensable Python recipes to ensure you always have the right code on hand for web application testing
About This Book
Get useful guidance on writing Python scripts and using libraries to put websites and web apps through their paces
Find the script you need to deal with any...
Migrating to Swift from Android
In 2000, I started my first PalmOS mobile app for an inventory-tracking project. The initial project was a full-staffed team effort that consisted of mobile developers, SAP consultants, supply-chain subject matter experts, middleware developers, QA testers, architects, business sponsors, and so forth. JavaME came up strong in 2002, followed...
Selenium 1.0 Testing Tools: Beginners Guide
The Selenium 1.0 Testing Tools Beginner's guide shows developers and testers how to create automated tests using a browser. You'll be able to create tests using Selenium IDE, Selenium Remote Control and Selenium 2 as well. A chapter is completely dedicated to Selenium 2. We will then see how our tests use element locators such as CSS,...
Mastering Modern Web Penetration Testing
This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
Penetrate and secure your web application using various techniques
Get this comprehensive
Hunting Security Bugs
Your essential reference to software security testing—from the experts.
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...
|Result Page: 17 16 15 14 13 12 11 10 9 8 |