 |
|
 Selenium Testing Tools Cookbook
Unlock the full potential of Selenium WebDriver to test your web applications in a wide range of situations. The countless recipes and code examples provided ease the learning curve and provide insights into virtually every eventuality.
Overview
-
Learn to leverage the power of Selenium WebDriver with...
|  |  BackTrack 5 Cookbook
Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5
-
Learn to perform penetration tests with BackTrack 5
-
Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
-
Provides detailed...
|  |  Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman... |
|
|
 Pro Git
Pro Git (Second Edition) is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro.
... |  |  Pro Visual Studio 2005 Team System Application Development
Visual Studio 2005 Team System is a large and complex product, and is arguably the most sophisticated development environment that Microsoft has ever built. It has enormous potential to improve people’s working lives by allowing them to draw together disparate tasks within a single reporting and testing structure.
In order to... |  |  |
|
 SQL Injection Attacks and Defense, Second Edition
SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award
"SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Security blog
SQL injection represents... |  |  |  |  Kali Linux Wireless Penetration Testing Essentials
Plan and execute penetration tests on wireless networks with the Kali Linux distribution
About This Book
-
Learn the fundamentals of wireless LAN security and penetration testing
-
Discover and attack wireless networks using specialized Kali Linux tools
-
A step-by-step,...
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |