-
Author Joshua Porter
No matter what type of web site or application you’re building, social interaction among the people who use it will be key to its success. They will talk about it, invite their friends, complain, sing its high praises, and dissect it in countless ways. With the righ....
Release Date 2008/04 -
Educating Social Entrepreneurs, Volume II
Author Maria Aggestam , Paul Miesing
Educating Social Entrepreneurs: From Business Plan Formulation to Implementation appears at a time of unprecedented environmental disasters, natural resources depletion, and significant failure of governments and global businesses to attend to worldwide social prob....
Release Date 2017/07 -
Learning Penetration Testing with Python
Author Christopher Duffy
Utilize Python scripting to execute effective and efficient penetration tests About This BookUnderstand how and where Python scripts meet the need for penetration testingFamiliarise yourself with the process of highlighting a specific methodology to exploit an envi....
Release Date 2015/09 -
Kali Linux - An Ethical Hacker's Cookbook
Author Himanshu Sharma
Over 120 recipes to perform advanced penetration testing with Kali LinuxAbout This BookPractical recipes to conduct effective penetration testing using the powerful Kali LinuxLeverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities wi....
Release Date 2017/10 -
Author Andrew Bindner , James Broad
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you thr....
Release Date 2013/12 -
Author Mark Redmond
Social decentering theory was developed in response to the confusion created by the use of the term empathy and to a lesser extent, perspective-taking, to reflect a wide and varied set of human cognitive processes and behaviors. Theory of Social Decentering: A Theo....
Release Date 2018/05 -
Digital Forensics with Kali Linux
Author Shiva V.N. Parasram
Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guideAbout This BookMaster powerful Kali Linux tools for digital investigation and analysisPerform evidence acquisition, preservation, and analys....
Release Date 2017/12 -
Assemble the Social Web with zembly
Author Chris Webster , Todd Fast , Paul Anderson , Gail Anderson
Use zembly to Create Social Web Applications for: Facebook, Flickr, iPhone, and More! With zembly you can create mashups and web applications drawing on content from virtually any web site, API call, or data stream. What’s more, zembly makes it as easy to deploy and....
Release Date 2008/12 -
Ethical Hacking and Penetration Testing Guide
Author Rafay Baloch
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end. You will learn how to properly utilize and interpret ....
Release Date 2017/09 -
Effective Python Penetration Testing
Author Rejah Rehim
Pen test your system like a pro and overcome vulnerabilities by leveraging Python scripts, libraries, and toolsAbout This BookLearn to utilize your Python scripting skills to pentest a computer system, network, and web-applicationGet proficient at the art of assess....
Release Date 2016/06 -
Social Capital, Social Identities
Author Hans Bernhard Schmid , Christoph Henning , Dieter Thomä
Current research on social capital tends to focus on an economic reading of social relations. Whereas economists pride themselves on reaching out to social theory at-large, sociologists criticize the economization of the social fabric. The concept of social capital....
Release Date 2014/08 -
From Oz to Kansas: Almost Every Black and White Conversion Technique Known to Man
Author Vincent Versace
The ability to create a stunning black and white image remains one of photography’s greatest and most aspirational skills. Being able to "see" in black and white is an enviable capability, and a well-crafted black and white photograph remains the finest of the fine ....
Release Date 2012/08 -
Author James S. Tiller
This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. It goes beyond the technical aspects of penetration testing to address th....
Release Date 2004/09 -
Author Mehmet Sahinoglu
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats.This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of....
Release Date 2016/05 -
Python: Penetration Testing for Developers
Author Dave Mound , Benjamin May , Andrew Mabbitt , Terry Ip , Cameron Buchanan , Mohit , Chr
Unleash the power of Python scripting to execute effective and efficient penetration testsAbout This BookSharpen your pentesting skills with PythonDevelop your fluency with Python to write sharper scripts for rigorous security testingGet stuck into some of the most....
Release Date 2016/10 -
An Introduction to Hacking and Crimeware
Author Victoria Loewengart
Defend your business, protect your livelihood, safeguard your future.Cybercrime is on the rise. Unchecked, it could destroy the entire global cyber infrastructure and wipe out many businesses. We need to defend ourselves against it, and we must fight back. Toolkits ....
Release Date 2012/01 -
Hacking For Dummies, 5th Edition
Author Kevin Beaver
Learn to hack your own system to protect against malicious attacks from outsideIs hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your ne....
Release Date 2015/12 -
Author Bob Seidensticker
Everyone knows that today's rate of technological change is unprecedented. With technological breakthroughs from the Internet to cell phones to digital music and pictures, everyone knows that the social impact of technology has never been as profound.But every....
Release Date 2006/04 -
Mastering Kali Linux for Advanced Penetration Testing - Fourth Edition
Author Vijay Kumar Velu
Master key approaches used by real attackers to perform advanced pentesting in tightly secured infrastructure, cloud and virtualized environments, and devices, and learn the latest phishing and hacking techniquesKey FeaturesExplore red teaming and play the hackers game to proactively defend your inf....
Release Date 2022/02 -
Coding for Penetration Testers, 2nd Edition
Author Ryan Linn , Jason Andress
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool....
Release Date 2016/09 -
Social Innovation, Inc.: 5 Strategies for Driving Business Growth through Social Change
Author Jason Saul
Could Wal-Mart offer a better solution to healthcare than Medicaid? Could GE help reduce global warming faster than the Kyoto protocol?Social Innovation, Inc. declares a new era where companies profit from social change. Leading corporations like GE, Wellpoint, Trav....
Release Date 2010/10 -
Social Security For Dummies, 2nd Edition
Author Jonathan Peterson
Praise for Social Security For Dummies:"Social Security for Dummies is a must read for people of any age who want a comfortable retirement. Jonathan Peterson does a great job of explaining this complicated system and helps you understand how to get the most from the....
Release Date 2015/03 -
Boundary Element Techniques in Engineering
Author S. Walker , C. A. Brebbia
Boundary Element Techniques in Engineering deals with solutions of two- and three-dimensional problems in elasticity and the potential theory where finite elements are inefficient. The book discusses approximate methods, higher-order elements, elastostatics, time-de....
Release Date 2016/01 -
Kali Linux - An Ethical Hacker's Cookbook - Second Edition
Author Himanshu Sharma
Discover end-to-end penetration testing solutions to enhance your ethical hacking skillsKey FeaturesPractical recipes to conduct effective penetration testing using the latest version of Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and more to detect....
Release Date 2019/03 -
Practical Web Penetration Testing
Author Gus Khawaja
Learn how to execute web application penetration testing end-to-endAbout This BookBuild an end-to-end threat model landscape for web application securityLearn both web application vulnerabilities and web intrusion testingAssociate network vulnerabilities with a web....
Release Date 2018/06 -
Penetration Testing with Shellcode
Author Hamza Megahed
Master Shellcode to leverage the buffer overflow conceptAbout This BookUnderstand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and MetasploitLearn to write and modify 64-bit shellcode along with kernel-level s....
Release Date 2018/02 -
Tissue Engineering, 2nd Edition
Author Jan De Boer , Clemens Van Blitterswijk
Tissue Engineering is a comprehensive introduction to the engineering and biological aspects of this critical subject. With contributions from internationally renowned authors, it provides a broad perspective on tissue engineering for students coming to the subject ....
Release Date 2014/12 -
Mining the Social Web, 2nd Edition
Author Matthew A. Russell
How can you tap into the wealth of social web data to discover who’s making connections with whom, what they’re talking about, and where they’re located? With this expanded and thoroughly revised edition, you’ll learn how to acquire, analyze, and summarize data from....
Release Date 2013/10 -
Learning Python Web Penetration Testing
Author Christian Martorella
Leverage the simplicity of Python and available libraries to build web security testing tools for your applicationAbout This BookUnderstand the web application penetration testing methodology and toolkit using PythonWrite a web crawler/spider with the Scrapy librar....
Release Date 2018/06 -
Author Andrew Weir , Cindy Gordon
Social Roots traces the history of a fundamental economic shift that is underway. The shift is rooted in virtualization, a key innovation factor, but when combined with influence networks, the significance becomes transformative. The combined power of these dimensio....
Release Date 2014/09