Home | Amazing | Today | Tags | Publishers | Years | Search 
Next Generation Red Teaming
Next Generation Red Teaming

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s...

Nmap 6: Network exploration and security auditing Cookbook
Nmap 6: Network exploration and security auditing Cookbook

Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth.

Overview

  • Master the power of Nmap 6
  • Learn how the...
Mastering Nmap Scripting Engine
Mastering Nmap Scripting Engine

Master the Nmap Scripting Engine and the art of developing NSE scripts

About This Book

  • Extend the capabilities of Nmap to perform custom tasks with the Nmap Scripting Engine
  • Learn the fundamentals of Lua programming
  • Develop powerful scripts for the Nmap Scripting...
Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...

Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Professional Team Foundation Server 2013 (Wrox Programmer to Programmer)
Professional Team Foundation Server 2013 (Wrox Programmer to Programmer)

Team Foundation Server and Visual Studio Online is now for everyone!

Team Foundation Server and Visual Studio Online is an integral part of Microsoft's Application Lifecycle Management suite for managing and delivering software projects. The 2013 update has opened up TFS for everyone by expanding capabilities to...
Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
SoapUI Cookbook
SoapUI Cookbook

Boost your SoapUI capabilities to test RESTful and SOAP APIs with over 65 hands-on recipes

About This Book

  • Quickly gain simple-to-use building blocks to power up your SoapUI toolkit
  • Use Groovy scripting and open source technologies to add the SoapUI functionality you need to successfully...
Guide to the IET Wiring Regulations: IET Wiring Regulations (BS 7671:2008 incorporating Amendment No 1:2011)
Guide to the IET Wiring Regulations: IET Wiring Regulations (BS 7671:2008 incorporating Amendment No 1:2011)

This authoritative, best-selling guide has been extensively updated with the new technical requirements of the IET Wiring Regulations (BS 7671: 2008) Amendment No. 1:2011, also known as the IET Wiring Regulations 17th Edition. With clear description, it provides a practical interpretation of the amended regulations –...

Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and...

Working Effectively with Legacy Code
Working Effectively with Legacy Code

Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is draining time and money away from your...

Software Testing Automation Tips: 50 Things Automation Engineers Should Know
Software Testing Automation Tips: 50 Things Automation Engineers Should Know

Quickly access 50 tips for software test engineers using automated methods. The tips point to practices that save time and increase the accuracy and reliability of automated test techniques. Techniques that play well during demos of testing tools often are not the optimal techniques to apply on a running project. This book highlights those...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy