Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Software Vulnerability Guide (Programming Series)
The Software Vulnerability Guide (Programming Series)
In today’s market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT...
Google Hacking for Penetration Testers, Volume 2
Google Hacking for Penetration Testers, Volume 2
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google...
The Cucumber Book: Behaviour-Driven Development for Testers and Developers (Pragmatic Programmers)
The Cucumber Book: Behaviour-Driven Development for Testers and Developers (Pragmatic Programmers)
Cucumber is a friendly tool. It wants to be part of your team, and it doesn’t mind being the nitpicky nerd who can remember every single little detail about what your system can and can’t do. Every team needs someone like that. Even better than that, Cucumber will volunteer to do all the boring repetitive checks that you need to...
Configuration Management Best Practices: Practical Methods that Work in the Real World
Configuration Management Best Practices: Practical Methods that Work in the Real World

Successfully Implement High-Value Configuration Management Processes in Any Development Environment

 

As IT systems have grown increasingly complex and mission-critical, effective configuration management (CM) has become critical to an...

Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Critical Testing Processes: Plan, Prepare, Perform, Perfect
Critical Testing Processes: Plan, Prepare, Perform, Perfect

"Rex Black has done it again!...Critical Testing Processes is a book that all software testers will want to read from cover to cover and then retain for frequent reference."

—From the Foreword by Rick Craig, software test manager, author, lecturer, and consultant

In today's...

Software Testing using Visual Studio 2012
Software Testing using Visual Studio 2012

Testing is one of the main phases in the software development lifecycle. Managing the test scenarios, test cases, defects, and linking each one of these is bit of a challenge without using any tools. For frequently changing businesses, it is essential to address testing requirements by matching the pace of the business. This can only be...

Java Look and Feel Design Guidelines: Advanced Topics
Java Look and Feel Design Guidelines: Advanced Topics

Java Look and Feel Design Guidelines Advanced Topics provides advanced design guidelines for user interfaces based on the Java Foundation Classes (JFC) with the Java look and feel. This book augments the award-winning Java Look and Feel Design Guidelines, 2nd ed.

Java Look and Feel Design...

Next Generation Red Teaming
Next Generation Red Teaming

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s...

Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

Lean from the Trenches: Managing Large-Scale Projects with Kanban
Lean from the Trenches: Managing Large-Scale Projects with Kanban

You know the Agile and Lean development buzzwords, you've read the books. But when systems need a serious overhaul, you need to see how it works in real life, with real situations and people. Lean from the Trenches is all about actual practice. Every key point is illustrated with a photo or diagram, and anecdotes bring you...

Cracking the Coding Interview: 150 Programming Questions and Solutions
Cracking the Coding Interview: 150 Programming Questions and Solutions

Now in the 5th edition, Cracking the Coding Interview gives you the interview preparation you need to get the top software developer jobs. This is a deeply technical book and focuses on the software engineering skills to ace your interview. The book is over 500 pages and includes 150 programming interview questions and answers, as well...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy