Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Test-Driven Infrastructure with Chef
Test-Driven Infrastructure with Chef

Test-Driven Infrastructure with Chef demonstrates a radical approach to developing web infrastructure that combines the powerful Chef configuration management framework with Cucumber, the leading Behavior-driven development (BDD) tool. Learn how to deliver real business value by developing infrastructure code test-first.

...
Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and...

Java 9 Modularity Revealed: Project Jigsaw and Scalable Java Applications
Java 9 Modularity Revealed: Project Jigsaw and Scalable Java Applications

Develop modular applications using the Java Platform Module System, the single most anticipated feature in Java 9. You will improve maintainability and performance of your Java applications by deploying only modules that are needed and encapsulating their implementation details. 


Until now Java has been monolithic.
...
The qmail Handbook
The qmail Handbook
  • Provides thorough instruction for installing, configuring, and optimizing qmail
  • Includes coverage of secure networking, troubleshooting issues, and mailing list administration
  • Covers what system administrators want to know by concentrating on qmail issues relevant to daily operation
  • ...
Ruby Developer's Guide
Ruby Developer's Guide
"Ruby Developer's Guide" discusses the role of Ruby in real-world applications, including the use of databases and XML, the coding of graphical user interfaces (GUIs) by means of different toolkits, communicating with other languages over SOAP/XML-RPC or sockets, and the programming of concurrent and distributed applications. Using...
Professional Linux Programming
Professional Linux Programming
By tapping the strengths of the open-source movement, developers can write custom Linux software without spending a dime on licensing fees. Aimed at the experienced C/C++ programmer, Professional Linux Programming provides a wide-ranging and hands-on guide to the different pieces of the puzzle that are required to program successfully...
IQ: A Smart History of a Failed Idea
IQ: A Smart History of a Failed Idea

Advance praise for

IQ A Smart History of a Failed Idea

"An up-to-date, reader-friendly account of the continuing saga of the mismeasure of women and men."
—Howard Gardner, author of Frames of Mind and Multiple Intelligences: New Horizons

"The good news is that you won't be...

Come, Let's Play: Scenario-Based Programming Using LSCs and the Play-Engine
Come, Let's Play: Scenario-Based Programming Using LSCs and the Play-Engine
This book does not tell a story. Instead, it is about stories. Or rather, in technical terms, it is about scenarios. Scenarios of system behavior. It concentrates on reactive systems, be they software or hardware, or combined computer-embedded systems, including distributed and real-time systems.

We propose a
...
Poisoning and Toxicology Handbook, Fourth Edition (Poisoning and Toxicology Handbook
Poisoning and Toxicology Handbook, Fourth Edition (Poisoning and Toxicology Handbook

A unique reference containing detailed reviews of more than 900 drugs and poisons, the Poisoning and Toxicology Handbook, Fourth Edition provides the latest information on medicinal, biological, herbal, and non-medicinal agents, and antidotes. Increasing its depth and scope with analyses of newer drugs, chemicals,...

Pro ASP.NET MVC 4
Pro ASP.NET MVC 4

The ASP.NET MVC 4 Framework is the latest evolution of Microsoft’s ASP.NET web platform. It provides a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility, combined with all the benefits of ASP.NET.

ASP.NET MVC 4 contains a number of significant...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

unlimited object storage image
Result Page: 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy