Home | Amazing | Today | Tags | Publishers | Years | Search 
Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools

My Dear Reader,

This wretched war, the gravest threat humankind has ever faced, is not going well at all.We have suffered major setbacks, as our ruthless adversary has conquered vast territories, leaving little ground controlled by our ragtag band of rebels. Our few surviving generals blame the lack of skills in our fighting
...

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Unity iOS Game Development Beginners Guide
Unity iOS Game Development Beginners Guide
If you are a developer who is interested in developing games for the iOS platform and want to leverage the Unity platform, this book will provide the core knowledge that you need to get started. If you are a Unity developer looking to port an existing application to the mobile platform, this book will give you an overview of the...
Database Systems: The Complete Book (2nd Edition)
Database Systems: The Complete Book (2nd Edition)

Database Systems: The Complete Book is ideal for Database Systems and Database Design and Application courses offered at the junior, senior and graduate levels in Computer Science departments. A basic understanding of algebraic expressions and laws, logic, basic data structure, OOP concepts, and programming environments is implied....

Bayesian Reasoning and Machine Learning
Bayesian Reasoning and Machine Learning
We live in a world that is rich in data, ever increasing in scale. This data comes from many di erent sources in science (bioinformatics, astronomy, physics, environmental monitoring) and commerce (customer databases, nancial transactions, engine monitoring, speech recognition, surveillance, search). Possessing the knowledge as to...
An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition)
An Introduction to IMS: Your Complete Guide to IBM Information Management System (2nd Edition)

IBM’s Definitive One-Stop Guide to IMS Versions 12, 11, and 10: for Every IMS DBA, Developer, and System Programmer

 

Over 90% of the top Fortune® 1000 companies rely on IBM’s Information Management System...

Oracle SOA Suite 11g Administrator's Handbook
Oracle SOA Suite 11g Administrator's Handbook
Oracle SOA Suite 11g is the backbone of messaging and application integration in a service oriented architecture. An Application Administrator is responsible for end-to-end administration and management of this infrastructure. The role extends to other areas such as architecting an SOA infrastructure, troubleshooting, monitoring,...
Beginning C# 5.0 Databases (Beginning Apress)
Beginning C# 5.0 Databases (Beginning Apress)
Welcome to this book. You have in your hands a book of ready-made solutions to common problems encountered while writing SQL to run against an Oracle database. I’ve written this book for the person in a hurry who needs to solve a specific problem and then get on with the job. Each recipe addresses a specific problem and...
Beginning XML, 5th Edition
Beginning XML, 5th Edition

THIS IS THE FIFTH EDITION OF A BOOK that has proven popular with professional developers and academic institutions. It strives to impart knowledge on a subject that at fi rst was seen by some as just another fad, but that instead has come to maturity and is now often just taken for granted. Almost six years have passed since the previous...

Digital Privacy: PRIME - Privacy and Identity Management for Europe
Digital Privacy: PRIME - Privacy and Identity Management for Europe
Information technologies are becoming pervasive and powerful to the point that the privacy of citizens is now at risk. Indeed, more and more of our daily transactions are conducted electronically and require us to transmit personal information. Examples include using an electronic identity card to prove one’s age in a...
Akka Essentials
Akka Essentials
Akka Essentials is meant as a guide for architects, solution providers, consultants, engineers, and anyone planning to design and implement a distributed, concurrent application based on Akka. It will refer to easy-to-explain concept examples, as they are likely to be the best teaching aids. It will explain the logic, code, and...
Configuring Financial Accounting in SAP
Configuring Financial Accounting in SAP
What you have in your hands is a unique book. You may have seen several books on SAP Financial Accounting (FI) that are available in the market, but none of them are as comprehensive as this, covering the gamut of Financial Accounting in SAP Financials including—besides the regular topics —FI-CA (Contract Accounts...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy