|
|
|
|
The Software Vulnerability Guide (Programming Series)In today’s market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT... | | Google Hacking for Penetration Testers, Volume 2A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google... | | |
|
| | Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by... | | Critical Testing Processes: Plan, Prepare, Perform, Perfect"Rex Black has done it again!...Critical Testing Processes is a book that all software testers will want to read from cover to cover and then retain for frequent reference."
—From the Foreword by Rick Craig, software test manager, author, lecturer, and consultant
In today's... |
|
Software Testing using Visual Studio 2012
Testing is one of the main phases in the software development lifecycle. Managing the test scenarios, test cases, defects, and linking each one of these is bit of a challenge without using any tools. For frequently changing businesses, it is essential to address testing requirements by matching the pace of the business. This can only be... | | Java Look and Feel Design Guidelines: Advanced TopicsJava Look and Feel Design Guidelines Advanced Topics provides advanced design guidelines for user interfaces based on the Java Foundation Classes (JFC) with the Java look and feel. This book augments the award-winning Java Look and Feel Design Guidelines, 2nd ed.
Java Look and Feel Design... | | Next Generation Red Teaming
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s... |
|
Coding for Penetration Testers: Building Better Tools
My Dear Reader,
This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting... | | Lean from the Trenches: Managing Large-Scale Projects with Kanban
You know the Agile and Lean development buzzwords, you've read the books. But when systems need a serious overhaul, you need to see how it works in real life, with real situations and people. Lean from the Trenches is all about actual practice. Every key point is illustrated with a photo or diagram, and anecdotes bring you... | | Cracking the Coding Interview: 150 Programming Questions and Solutions
Now in the 5th edition, Cracking the Coding Interview gives you the interview preparation you need to get the top software developer jobs. This is a deeply technical book and focuses on the software engineering skills to ace your interview. The book is over 500 pages and includes 150 programming interview questions and answers, as well... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |