Les Vieux fourneaux (2018) 720p Telecharger french download | Zombillénium | Snowfall.S01E07.HDTV.x264-SVA.srt
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Penetration Testing Essentials
Python Penetration Testing Essentials

Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • ...
Penetration Testing Bootcamp
Penetration Testing Bootcamp

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

...

Agile UX Storytelling: Crafting Stories for Better Software Development
Agile UX Storytelling: Crafting Stories for Better Software Development

Learn how to use stories throughout the agile software development lifecycle. Through lessons and examples, Agile UX Storytelling demonstrates to product owners, customers, scrum masters, software developers, and designers how to craft stories to facilitate communication, identify problems and patterns, refine collaborative...

Refactoring to Agility
Refactoring to Agility

Agile methodologies, such as XP, Scrum, Crystal, and Lean Software Development enable development organizations to deliver higher-quality software far more rapidly. However, for the "non-agile" development organization, transitioning to agility is an enormous leap, requiring radically new skills and presenting profound...

Win32 API Programming with Visual Basic
Win32 API Programming with Visual Basic
The Win32 API, or Application Programming Interface, is of immense use in extending the power of Visual Basic. The Win32 API is the collection of functions and subroutines that provides programmatic access to the features of the operating system. It allows Visual Basic programmers far greater access to the inner workings of the Windows operating...
Network Intrusion Detection (3rd Edition)
Network Intrusion Detection (3rd Edition)

Our goal in writing Network Intrusion Detection, Third Edition has been toempower you as an analyst. We believe that if you read this book cover to cover,and put the material into practice as you go, you will be ready to enter theworld of intrusion analysis. Many people have read our books, or attended ourlive class offered by SANS, and the...

The Essays of Warren Buffett: Lessons for Corporate America, Third Edition
The Essays of Warren Buffett: Lessons for Corporate America, Third Edition
The original edition of The Essays of Warren Buffett: Lessons for Corporate America was the centerpiece of a symposium held two decades ago at the Benjamin N. Cardozo School of Law under the auspices of its Samuel and Ronnie Heyman Center on Corporate Governance. This gathering brought hundreds of Cardozo students together for a...
Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
Making Sense of Data: Designing Effective Visualizations
Making Sense of Data: Designing Effective Visualizations

You have a mound of data sitting in front of you and a suite of computation tools at your disposal. And yet, you’re stumped as to how to turn that data into insight. Which part of that data actually matters, and where is this insight hidden?

If you’re a data scientist who struggles to navigate the murky space...

Oracle PL/SQL for DBAs
Oracle PL/SQL for DBAs

PL/SQL, Oracle's powerful procedural language, has been the cornerstone of Oracle application development for nearly 15 years. Although primarily a tool for developers, PL/SQL has also become an essential tool for database administration, as DBAs take increasing responsibility for site performance and as the lines between...

Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications and technologies for gathering, providing access to, and analyzing data for the purpose of helping enterprise users make better business decisions. The term implies having a comprehensive knowledge of all factors that affect a business, such as customers, competitors, business partners,...

Software & Systems Requirements Engineering: In Practice
Software & Systems Requirements Engineering: In Practice

Proven Software & Systems Requirements Engineering Techniques

"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced...

Result Page: 20 19 18 17 16 15 14 13 12 11 
¬©2018 LearnIT (support@pdfchm.net) - Privacy Policy