PS2 Aventura | Where the Heart Is | The Incredibles
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Testing: Concepts and Operations (Quantitative Software Engineering Series)
Software Testing: Concepts and Operations (Quantitative Software Engineering Series)

Explores and identifies the main issues, concepts, principles and evolution of software testing, including software quality engineering and testing concepts, test data generation, test deployment analysis, and software test management

This book examines the principles, concepts, and processes that are fundamental to
...

Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Pro Python Best Practices: Debugging, Testing and Maintenance
Pro Python Best Practices: Debugging, Testing and Maintenance

Learn software engineering and coding best practices to write Python code right and error free. In this book you’ll see how to properly debug, organize, test, and maintain your code, all of which leads to better, more efficient coding.

Software engineering is difficult. Programs of any substantial length are...

Learning Node: Moving to the Server-Side
Learning Node: Moving to the Server-Side

Take your web development skills from browser to server with Node—and learn how to write fast, highly scalable network applications on this JavaScript-based platform. Updated for the latest Node Long Term Support (LTS) and Node Current (6.0) releases, this hands-on edition helps you master Node’s core fundamentals and...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Swift iOS 24-Hour Trainer
Swift iOS 24-Hour Trainer

Jump into the app development world with confidence!

iOS Swift 24-Hour Trainer combines book and video lessons in Apple's Swift programming language to prepare you to build iPhone and iPad apps—and distribute them through the Appstore. First, this approachable text covers the fundamentals of Swift by...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

The only official study guide for the new CCSP exam

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter...

OpenStack in Action
OpenStack in Action

Summary

OpenStack in Action offers the real world use cases and step-by-step instructions you can take to develop your own cloud platform from from inception to deployment. This book guides you through the design of both the physical hardware cluster and the infrastructure services you'll need to create a...

iOS 9 Application Development in 24 Hours, Sams Teach Yourself (7th Edition)
iOS 9 Application Development in 24 Hours, Sams Teach Yourself (7th Edition)

Covers iOS 9.1 and up, Xcode 7.x, iPhone, iPad, and More!

In just 24 sessions of one hour each, learn how to build powerful applications for today’s hottest handheld devices: the iPhone and iPad! Using this book’s straightforward, step-by-step approach, you’ll master every skill and technology you
...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)
Ethical Hacking and Countermeasures: Linux, Macintosh and Mobile Systems (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Beginning Spring Boot 2: Applications and Microservices with the Spring Framework
Beginning Spring Boot 2: Applications and Microservices with the Spring Framework

Learn Spring Boot and how to build Java-based enterprise, web, and microservice applications with it. In this book, you'll see how to work with relational and NoSQL databases, build your first microservice, enterprise, or web application, and enhance that application with REST APIs. You'll also learn how to build reactive web...

Result Page: 184 183 182 181 180 179 178 177 176 175 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy