Home | Amazing | Today | Tags | Publishers | Years | Search 
Nmap 6: Network exploration and security auditing Cookbook
Nmap 6: Network exploration and security auditing Cookbook

Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth.

Overview

  • Master the power of Nmap 6
  • Learn how the...
Guide to the IET Wiring Regulations: IET Wiring Regulations (BS 7671:2008 incorporating Amendment No 1:2011)
Guide to the IET Wiring Regulations: IET Wiring Regulations (BS 7671:2008 incorporating Amendment No 1:2011)

This authoritative, best-selling guide has been extensively updated with the new technical requirements of the IET Wiring Regulations (BS 7671: 2008) Amendment No. 1:2011, also known as the IET Wiring Regulations 17th Edition. With clear description, it provides a practical interpretation of the amended regulations –...

Unreal Engine 4 Game Development Essentials
Unreal Engine 4 Game Development Essentials

Key Features

  • Get to grips with the user interface of Unreal Engine 4 and find out more about its various robust features
  • Create dream video games with the help of the different tools Unreal Engine 4 offers
  • Create video-games and fully utilize the power of Unreal Engine 4 to bring games to...
Lean from the Trenches: Managing Large-Scale Projects with Kanban
Lean from the Trenches: Managing Large-Scale Projects with Kanban

You know the Agile and Lean development buzzwords, you've read the books. But when systems need a serious overhaul, you need to see how it works in real life, with real situations and people. Lean from the Trenches is all about actual practice. Every key point is illustrated with a photo or diagram, and anecdotes bring you...

Software Testing Automation Tips: 50 Things Automation Engineers Should Know
Software Testing Automation Tips: 50 Things Automation Engineers Should Know

Quickly access 50 tips for software test engineers using automated methods. The tips point to practices that save time and increase the accuracy and reliability of automated test techniques. Techniques that play well during demos of testing tools often are not the optimal techniques to apply on a running project. This book highlights those...

Working Effectively with Legacy Code
Working Effectively with Legacy Code

Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your...

Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and...

Professional Team Foundation Server 2013 (Wrox Programmer to Programmer)
Professional Team Foundation Server 2013 (Wrox Programmer to Programmer)

Team Foundation Server and Visual Studio Online is now for everyone!

Team Foundation Server and Visual Studio Online is an integral part of Microsoft's Application Lifecycle Management suite for managing and delivering software projects. The 2013 update has opened up TFS for everyone by expanding capabilities to...
Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...

Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Persistence in the Enterprise: A Guide to Persistence Technologies (developerWorks Series)
Persistence in the Enterprise: A Guide to Persistence Technologies (developerWorks Series)

The Definitive Guide to Today's Leading Persistence Technologies

Persistence in the Enterprise is a unique, up-to-date, and objective guide to building the persistence layers of enterprise applications. Drawing on their extensive experience, five leading IBM® Web...

Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy