 |
|
 Coding for Penetration Testers: Building Better Tools
My Dear Reader,
This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting... |  |  The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context... |  |  Unity iOS Game Development Beginners Guide
If you are a developer who is interested in developing games for the iOS platform and want
to leverage the Unity platform, this book will provide the core knowledge that you need
to get started. If you are a Unity developer looking to port an existing application to the
mobile platform, this book will give you an overview of the... |
|
 Database Systems: The Complete Book (2nd Edition)
Database Systems: The Complete Book is ideal for Database Systems and Database Design and Application courses offered at the junior, senior and graduate levels in Computer Science departments. A basic understanding of algebraic expressions and laws, logic, basic data structure, OOP concepts, and programming environments is implied. ... |  |  Bayesian Reasoning and Machine Learning
We live in a world that is rich in data, ever increasing in scale. This data comes from many dierent
sources in science (bioinformatics, astronomy, physics, environmental monitoring) and commerce (customer
databases, nancial transactions, engine monitoring, speech recognition, surveillance, search). Possessing
the knowledge as to... |  |  |
|
|
 Digital Privacy: PRIME - Privacy and Identity Management for Europe
Information technologies are becoming pervasive and powerful to the point
that the privacy of citizens is now at risk. Indeed, more and more of our daily
transactions are conducted electronically and require us to transmit personal
information. Examples include using an electronic identity card to prove one’s
age in a... |  |  Akka Essentials
Akka Essentials is meant as a guide for architects, solution providers, consultants,
engineers, and anyone planning to design and implement a distributed, concurrent
application based on Akka. It will refer to easy-to-explain concept examples, as
they are likely to be the best teaching aids. It will explain the logic, code, and... |  |  Configuring Financial Accounting in SAP
What you have in your hands is a unique book. You may have seen several books
on SAP Financial Accounting (FI) that are available in the market, but none of them
are as comprehensive as this, covering the gamut of Financial Accounting in SAP
Financials including—besides the regular topics —FI-CA (Contract Accounts... |
|
| Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |