Login: Password:  Do not remember me

Categories




Video TrainingReverse Engineering Win32 Applications



Reverse Engineering Win32 Applications

Reverse Engineering Win32 Applications
English | Size: 2.99 GB
Category: Tutorial

This course will familiarize students with all aspects of reverse engineering (reversing) Windows 32-bit applications for the purposes of locating flaws and developing exploits. By the end of this course students will be able to understand, locate, and exploit all of the common flows in 32-bit Windows software. These flaws include, but are not limited to, buffer overflow, heap overflows, format string flaws, section overflows, and kernel flaws. Along the way students will gain a better understanding of how Windows 32-bit applications work and will be exposed to a number of common reversing tools such as specialized debuggers (IDA Pro) and fuzzers. As always, you will also learn how to leverage Python and other scripting tools in order to automate the discovery and exploitation of software flaws.

      Read more...         

Video TrainingPacktpub - Securing Applications in Node.js [Video]



Packtpub - Securing Applications in Node.js [Video]

Packtpub - Securing Applications in Node.js [Video]
English | Size: 505.76 MB
Category: Programming | E-learning | Security | others

Everyone agrees that web application security is very important but there are very few to take it seriously. There have been lots of high-profile instances of websites having their password databases exposed to the World (e.g. Ashley Madison and Adobe). You don't want the application you are building to be the next big security horror story. This course will get you up-to-speed on the key attack vectors, quickly covering issues such as cross-site scripting, CSRF, and SQL injection. It will provide you with clear, practical approaches to mitigating these problems. It will show you how to implement OAuth and two-factor authentication for the additional protection of users who need it. Further, we will delve into the critical process of adding secured, well-thought-out authentication and authorization to a Node.js application. After completing this course, you should be confident in your ability to make an application secure with Node.js and keep your data protected.

      Read more...         

Video TrainingRapid Prototyping Web Applications Using Node.js and MongoDB



Rapid Prototyping Web Applications Using Node.js and MongoDB
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 1ch | Duration: 1H 6M | 307 MB
Genre: eLearning | Language: English


      Read more...         

Video TrainingC# Intermediate Programming : Applications Driven Approach



C# Intermediate Programming : Applications Driven Approach
C# Intermediate Programming : Applications Driven Approach
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 6.49 GB
Duration: 30.5 hours | Genre: eLearning Video | Language: English

A great way learn to how to solve real problems using Winforms in C#. More videos and exercises than any Intro course.

      Read more...         

Video TrainingPython 3 Network Programming - Build 5 Network Applications



Python 3 Network Programming - Build 5 Network Applications

Python 3 Network Programming - Build 5 Network Applications
English | Size: 5.36 GB
Category: Programming | E-learning

Requirements

You should have a great desire to learn Python programming and do it in a hands-on fashion, without having to watch countless videos filled with slides and theory.
You should already be familiar with networking concepts like: Switching, TCP/IP, CLI, SSHv2, Telnet, OSI Layers.
You are going to use only free software throughout the course: Python 3.7, VirtualBox, Arista vEOS, Notepad++.
All you need is a decent PC or laptop (2GHz CPU, 8-16GB RAM) and an Internet connection to download the free tools.
No prior Python knowledge is required! This training teaches your everything, from scratch.

      Read more...         

Video TrainingPACKT HANDS ON KUBERNETES AND DOCKER FOR DISTRIBUTED APPLICATIONS



PACKT HANDS ON KUBERNETES AND DOCKER FOR DISTRIBUTED APPLICATIONS

PACKT HANDS ON KUBERNETES AND DOCKER FOR DISTRIBUTED APPLICATIONS
English | Size: 143.20 MB
Category: Tutorial
.
If you have a mission critical application that needs to be up and running 24/7 and each outage would cost you a lot of money and reputation then it is important that you have the right tools and processes in place to handle this requirement. Docker allow you to package the many application services that are part of your distributed application into self contained standard packages called containers. With the tool docker-compose developers can then run, scale, test and debug the application, simulating a production like environment on their development workstations.


      Read more...         

E-BooksAzobenzene Aspects, Applications and Research



Azobenzene Aspects, Applications and Research


Language: English | Total pages: 157 | Format: pdf | Size: 6.33 MB |





      Read more...         

E-BooksClick Chemistry Approaches, Applications, and Challenges



Click Chemistry Approaches, Applications, and Challenges


Language: English | Total pages: 379 | Format: pdf | Size: 11.56 MB |





      Read more...         

E-BooksSliding Mode Control Theory And Applications



Sliding Mode Control Theory And Applications


Language: English | Total pages: 254 | Format: pdf | Size: 117.7 MB |





      Read more...         

E-BooksFractional Calculus Theory and Applications



Fractional Calculus Theory and Applications


Language: English | Total pages: 210 | Format: pdf | Size: 4.29 MB |





      Read more...         

Page:

Search



Updates


«    April 2019    »
MonTueWedThuFriSatSun
1234567
891011121314
15161718192021
22232425262728
2930 


Friend Sites


» ReleaseLog
» Gfxtorrent

Your Link Here ?
(Pagerank 4 or above)