Home | Amazing | Today | Tags | Publishers | Years | Search 
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition

Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions.

Key Features

  • Get to grips with the underlying technical principles and implementations of blockchain
  • Build powerful...
Learning Java by Building Android Games: Learn Java and Android from scratch by building six exciting games, 2nd Edition
Learning Java by Building Android Games: Learn Java and Android from scratch by building six exciting games, 2nd Edition

Develop engaging games for the Android platform with Java

Key Features

  • Learn Java, Android, and object-oriented programming from scratch
  • Build games including Sub Hunter, Retro Pong, and Bullet Hell
  • Create and design your own games, such as an open-world...
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms

Investigate, analyze, and report iOS, Android, and Windows devices

Key Features

  • Get hands-on experience in performing simple to complex mobile forensics techniques
  • Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected...
Hands-On Functional Programming in Rust: Build modular and reactive applications with functional programming techniques in Rust 2018
Hands-On Functional Programming in Rust: Build modular and reactive applications with functional programming techniques in Rust 2018

Explore the support Rust offers for creating functional applications in Rust. Learn about various design patterns, implementing concurrency, metaprogramming, and so on in the process

Key Features

  • Learn generics, organization, and design patterns in functional programming
  • ...
Jupyter Cookbook: Over 75 recipes to perform interactive computing across Python, R, Scala, Spark, JavaScript, and more
Jupyter Cookbook: Over 75 recipes to perform interactive computing across Python, R, Scala, Spark, JavaScript, and more

Leverage the power of the popular Jupyter notebooks to simplify your data science tasks without any hassle

Key Features

  • Create and share interactive documents with live code, text and visualizations
  • Integrate popular programming languages such as Python, R, Julia, Scala...
Vue.js 2 Design Patterns and Best Practices: Build enterprise-ready, modular Vue.js applications with Vuex and Nuxt
Vue.js 2 Design Patterns and Best Practices: Build enterprise-ready, modular Vue.js applications with Vuex and Nuxt

Become an expert Vue developer by understanding the design patterns and component architecture of Vue.js to write clean and maintainable code.

Key Features

  • Craft highly modular applications by exploring the design patterns and component architecture of Vue.js
  • Enforce a...
Thoughtful Data Science: A Programmer's Toolset for Data Analysis and Artificial Intelligence with Python, Jupyter Notebook, and PixieDust
Thoughtful Data Science: A Programmer's Toolset for Data Analysis and Artificial Intelligence with Python, Jupyter Notebook, and PixieDust

Bridge the gap between developer and data scientist by creating a modern open-source, Python-based toolset that works with Jupyter Notebook, and PixieDust.

Key Features

  • Think deeply as a developer about your strategy and toolset in data science
  • Discover the best tools that...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases
Artificial Intelligence By Example: Develop machine intelligence from scratch using real artificial intelligence use cases

Be an adaptive thinker that leads the way to Artificial Intelligence

Key Features

  • AI-based examples to guide you in designing and implementing machine intelligence
  • Develop your own method for future AI solutions
  • Acquire advanced AI, machine learning, and...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Result Page: Previous 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778 2779 2780 2781 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy