Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Propeller Programming: Using Assembler, Spin, and C
Propeller Programming: Using Assembler, Spin, and C
Learn to program the Propeller in Spin and C and how to map the Propeller Assembler (PASM) language from other high-level languages you might know.

The overall task you will pursue in the book is to implement a Delta Compression algorithm: first in Spin, then in PASM, then in C. Along the way, you'll review
...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services....
Mastering SVG: Ace web animations, visualizations, and vector graphics with HTML, CSS, and JavaScript
Mastering SVG: Ace web animations, visualizations, and vector graphics with HTML, CSS, and JavaScript

Take the plunge and develop cross-browser-compatible and responsive web designs with SVG

Key Features

  • Master the art of custom animations and visualizations with SVG, CSS, and JavaScript
  • Combine SVG with third-party libraries and frameworks such as React, JQuery, D3, and...
Using Your Web Skills To Make Money: Secrets of a Successful Online Course Creator and Other Income Strategies that Really Work
Using Your Web Skills To Make Money: Secrets of a Successful Online Course Creator and Other Income Strategies that Really Work

Discover what you need to learn to thrive and master online course creation and other income generating strategies that really work. This short book is the story of what worked and what didn’t for author Azat Mardan, giving you the best tools and inspiration to achieve your monetary, career, creative, or contributorship...

Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists
Feature Engineering for Machine Learning: Principles and Techniques for Data Scientists

Feature engineering is a crucial step in the machine-learning pipeline, yet this topic is rarely examined on its own. With this practical book, you’ll learn techniques for extracting and transforming features—the numeric representations of raw data—into formats for machine-learning models. Each chapter guides you...

Build, Run, and Sell Your Apple Consulting Practice: Business and Marketing for iOS and Mac Start Ups
Build, Run, and Sell Your Apple Consulting Practice: Business and Marketing for iOS and Mac Start Ups
Starting an app development company is one of the most rewarding things you’ll ever do. Or it sends you into bankruptcy and despair. If only there was a guide out there, to help you along the way. This book is your guide to starting, running, expanding, buying, and selling a development consulting firm. But not just any...
Website Scraping with Python: Using BeautifulSoup and Scrapy
Website Scraping with Python: Using BeautifulSoup and Scrapy
Closely examine website scraping and data processing: the technique of extracting data from websites in a format suitable for further analysis. You'll review which tools to use, and compare their features and efficiency. Focusing on BeautifulSoup4 and Scrapy, this concise, focused book highlights common problems and suggests...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Mastering Arduino: A project-based approach to electronics, circuits, and programming
Mastering Arduino: A project-based approach to electronics, circuits, and programming

Mastering Arduino is a practical, no-nonsense guide that will teach you the electronics and programming skills that you need to create advanced Arduino projects.

Key Features

  • Covers enough electronics and code for users at any level
  • Includes complete circuit diagrams for...
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Result Page: Previous 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy