[leak] [pdf] osint techniques: resources for uncovering online information (NEW)
This is author Michael Bazzell's book leak, OSINT Techniques: Resources for Uncovering Online Information in PDF format. This book looks at OSINT from a different angle. It draws on external resources to...
Get up to speed with API security using this comprehensive guide full of best practices for building safer and secure APIs
Key Features:
Develop a profound understanding of the inner workings of APIs with a sharp focus on security
Learn the tools and techniques employed by API security...
Are you tired of relying on traditional, reactive cybersecurity methods that always seem one step behind the hackers? Do you want to take your organization’s cyber defense to the next level and proactively prevent, detect, and respond to even the most advanced and persistent threats? Then this...
Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives? How do I get started in a career in cyber and...
Find solutions to all your problems related to Linux system programming using practical recipes for developing your own system programs
Key Features
* Develop a deeper understanding of how Linux system programming works
* Gain hands-on experience of working with different Linux projects with the...
Malware is often delivered through complex and convoluted distribution channels. This course will teach you the basics of performing fast and effective techniques for analyzing these chains and identifying important indicators of compromise.
Malware is distributed through a wide variety of...
Antivirus Bypass Techniques
Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic...
you a creative visionary or an individual on the hunt for a design powerhouse that doesn't drain your wallet but offers an abundance of features? Are you in need of a versatile application equipped with a toolkit that empowers you to effortlessly enhance your images? How about a design suite...
Gain a thorough understanding of DevOps concepts and learn to deploy AWS DevOps services in an organization. This book covers AWS DevOps deployment and building applications and services for enhanced performance.
A Complete Guide to DevOps with AWS will show you how to use AWS DevOps to...
Master Python techniques and libraries to reduce run times, efficiently handle huge datasets, and optimize execution for complex machine learning applications.
Fast Python is a toolbox of techniques for high performance Python including:
Writing efficient pure-Python code
Optimizing the NumPy...
Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scale
Key Features
Advice on how to use the ethical hacking methodology and thought process to perform a successful ethical hack
An exploration of the...
Build your expertise in Windows incident analysis by mastering artifacts and techniques for efficient cybercrime investigation with this comprehensive guide
Key Features
Gain hands-on experience with reputable and reliable tools such as KAPE and FTK Imager
Explore artifacts and techniques for...
Develop web API applications using design patterns, advanced customization, and advanced technologies such as SignalR, gRPC, and GraphQL, while leveraging powerful cloud platforms and tools to accelerate development.
Key Features
Gain skills in building modern ASP.NET Core web API applications...
Improve your ASP.NET skills with industry-proven methodologies and practices to make code efficient and maintainable throughout the software development lifecycle.
Key Features
Understand standard best practices for each stage of the SDLC, including pre-coding, encoding, and post-coding stages...
I want to sell a database in the form of PDF files and also text, around 100 thousand TB more than a database and I want to sell it to everyone here who wants to buy it. Yes, I also made my own program, where in the world of hacking, many beginner hackers want to hack the system. I have the...
Do you want to learnHow to Hack and Secure your mobile device (Android + iOS)?This course covers tools and techniques to hack a mobile device in order to teach you how to protect your mobile devices from hackers. It’s a quickly learn course which focuses on hacking and security techniques for...
Software Testing Course
What you’ll learn
Software Testing Course
Basic Concepts of Software Testing
Test case & Bug Report Writing
Black-Box Test Techniques
Requirements Review & Test Scenarios Writing using Trello
Implementing the test process on a Test Management Tool (Testlink)
Basics of...
Do you want to learnHow to Hack and Secure your mobile device (Android + iOS)?This course covers tools and techniques to hack a mobile device in order to teach you how to protect your mobile devices from hackers. It’s a quickly learn course which focuses on hacking and security techniques for...
Top 106 videos tutorial techniques which hackers use for web hacking :
🔲SQL Injection attacks
🔲Cross Site Scripting (XSS)
🔲Denial of Service (DoS/DDoS)
🔲Cross-site request forgery
🔲DNS Spoofing (DNS cache poisoning)
🔲Social engineering techniques
🔲Phishing
🔲Baiting
🔲Pretexting
🔲Dorking
Size...