Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Instant Burp Suite Starter
Instant Burp Suite Starter

Get up and running with Burp Suite using this hands-on practical guide

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  •  
  • Intercept HTTP/S requests with Burp Proxy.
  • Tamper and analyze responses.
  • ...
BackTrack 5 Cookbook
BackTrack 5 Cookbook

Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5

  • Learn to perform penetration tests with BackTrack 5
  • Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
  • Provides detailed...
Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs (SEI Series in Software Engineering)
Java Coding Guidelines: 75 Recommendations for Reliable and Secure Programs (SEI Series in Software Engineering)

“A must-read for all Java developers. . . . Every developer has a responsibility to author code that is free of significant security vulnerabilities. This book provides realistic guidance to help Java developers implement desired functionality with security, reliability, and maintainability goals...

Mastering Metasploit
Mastering Metasploit

With this book, you can improve your Metasploit skills and learn to put your network’s defenses to the ultimate test. The step-by-step approach teaches you the techniques and languages needed to become an expert.
Overview

  • Develops Real World Approaches to Penetration testing using Metasploit
  • ...
Encyclopedia of Cybercrime
Encyclopedia of Cybercrime
The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and
...
Business Continuity Management: Building an Effective Incident Management Plan
Business Continuity Management: Building an Effective Incident Management Plan

Whether an international corporation or a small business, developing and utilizing

a Business Continuity Management (BCM) Plan protects companies and their personnel, facilities, materials, and activities from the broad spectrum of risks that face businesses and government agencies on a daily basis, whether at home or
...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Android Hacker's Handbook
Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...

The Database Hacker's Handbook: Defending Database Servers
The Database Hacker's Handbook: Defending Database Servers
Databases are the nerve center of our economy. Every piece of your personal information is stored there—medical records, bank accounts, employment history, pensions, car registrations, even your children's grades and what groceries you buy. Database attacks are potentially crippling—and relentless.

In this essential follow-up to...

The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Innocent Code : A Security Wake-Up Call for Web Programmers
Innocent Code : A Security Wake-Up Call for Web Programmers
This book is an entertaining read, that shows how to change your mindset from website construction to website destruction so as to avoid writing dangerous code.

This concise and practical book will show where code vulnerabilities lie and how best to fix them. Its value is in showing where code may be exploited to gain access to--or break...

Researchers at Risk: Precarity, Jeopardy and Uncertainty in Academia (Palgrave Studies in Education Research Methods)
Researchers at Risk: Precarity, Jeopardy and Uncertainty in Academia (Palgrave Studies in Education Research Methods)
This book explores the phenomenon of researchers at risk: that is, the experiences of scholars whose research topics require them to engage with diverse kind of dangers, uncertainties or vulnerabilities. This risk may derive from working with variously marginalised individuals or groups, or from being members of such groups themselves. At other...
unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy