Books on the topic 'Exploit testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Exploit testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Maynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Syngress, 2007.
Find full textMaynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Syngress, 2007.
Find full textCenter, Turner-Fairbank Highway Research, ed. Videotapes explain the how and why of LTPP's revised resilient modulus laboratory tests and procedures. [U.S. Dept. of Transportation, Federal Highway Administration], Research, Development, and Technology, Turner-Fairbank Highway Research Center, 1999.
Find full texteditor, Rope Susan, ed. The rogue colonel: Exploits of "Daddy" Thyson and his aircraft testing unit during World War II. Outskirts Press, 2016.
Find full textBlau, Francine D. Do cognitive test scores explain higher US wage inequality? National Bureau of Economic Research, 2001.
Find full textBarnes, David Milller. Depression and Distress in Blacks and Whites in the US: Testing a Hypothesis to Explain a Double Paradox. [publisher not identified], 2015.
Find full textMaugeri, Giuseppe. L’insegnamento dell’italiano a stranieri Alcune coordinate di riferimento per gli anni Venti. Fondazione Università Ca’ Foscari, 2021. http://dx.doi.org/10.30687/978-88-6969-523-0.
Full textMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier, 2007. http://dx.doi.org/10.1016/b978-1-59749-074-0.x5000-4.
Full textFoster, James. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Syngress, 2007.
Find full textMaynor, David. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research. Elsevier Science & Technology Books, 2011.
Find full textMetasploit Penetration Testing Cookbook: Evade Antiviruses, Bypass Firewalls, and Exploit Complex Environments with the Most Widely Used Penetration Testing Framework. de Gruyter GmbH, Walter, 2018.
Find full textMegahed, Hamza. Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities. Packt Publishing, 2018.
Find full textSingh, Abhinav, Nipun Jaswal, Monika Agarwal, and Daniel Teixeira. Metasploit Penetration Testing Cookbook: Evade Antiviruses, Bypass Firewalls, and Exploit Complex Environments with the Most Widely Used Penetration Testing Framework, 3rd Edition. Packt Publishing, Limited, 2018.
Find full textMetasploit Revealed: Secrets of the Expert Pentester: Exploit the secrets of Metasploit to master the art of penetration testing. Packt Publishing, 2017.
Find full textNajera-Gutierrez, Gilberto. Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition. Packt Publishing - ebooks Account, 2018.
Find full textNajera-Gutierrez, Gilberto. Kali Linux Web Penetration Testing Cookbook: Over 80 Recipes on How to Identify, Exploit, and Test Web Application Security with Kali Linux 2. Packt Publishing, Limited, 2016.
Find full textWalikar, Riyaz Ahemed, Carlos A. Lozano, and Dhruv Shah. Hands-On Application Penetration Testing with Burp Suite: Use Burp Suite and Its Features to Inspect, Detect, and Exploit Security Vulnerabilities in Your Web Applications. Packt Publishing, Limited, 2019.
Find full textHerrmann, Konrad, ed. Hardness Testing. ASM International, 2011. http://dx.doi.org/10.31399/asm.tb.htpa.9781627083461.
Full textTkaczyk, Viktoria, Mara Mills, and Alexandra Hui, eds. Testing Hearing. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197511121.001.0001.
Full textNovak, Peter. Autonomic Testing. Oxford University Press, 2019. http://dx.doi.org/10.1093/med/9780190889227.001.0001.
Full textElder, Catherine, Rod Ellis, Hayo Reinders, Shawn Loewen, and Rosemary Erlam. Implicit and Explicit Knowledge in Second Language Learning, Testing and Teaching. Multilingual Matters, 2009.
Find full textRahalkar, Sagar, and Nipun Jaswal. the Complete Metasploit Guide: Explore Effective Penetration Testing Techniques with Metasploit. Packt Publishing, Limited, 2019.
Find full textElder, Catherine, Rod Ellis, Hayo Reinders, Shawn Loewen, and Rosemary Erlam. Implicit and Explicit Knowledge in Second Language Learning, Testing and Teaching. Multilingual Matters, 2009.
Find full textImplicit and explicit knowledge in second language learning, testing and teaching. Multilingual Matters, 2009.
Find full textEnd-To-End Web Testing with Cypress: Explore Techniques for Automated Frontend Web Testing with Cypress and JavaScript. de Gruyter GmbH, Walter, 2021.
Find full textEnd-To-End Web Testing with Cypress: Explore Techniques for Automated Frontend Web Testing with Cypress and JavaScript. Packt Publishing, Limited, 2021.
Find full textAvery, William H., and Chih Wu. Renewable Energy from the Ocean. Oxford University Press, 1994. http://dx.doi.org/10.1093/oso/9780195071993.001.0001.
Full textMurray, Campbell. PowerShell for Penetration Testing: Explore the Capabilities of PowerShell for Pentesters Across Multiple Platforms. Packt Publishing, Limited, 2024.
Find full textVallone, Donna. How Wealth Links to Health: Testing Theories to Explain Socioeconomic Disparities in Disease and Death. VDM Verlag, 2008.
Find full textNajera-Gutierrez, Gilberto, and Juned Ahmed Ansari. Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux. Packt Publishing - ebooks Account, 2018.
Find full textWeb Penetration Testing with Kali Linux: Explore the Methods and Tools of Ethical Hacking with Kali Linux. de Gruyter GmbH, Walter, 2018.
Find full textRosenberg, Michael. Doubts and Faith. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190845896.003.0005.
Full textShephard OAM, Mark, ed. Practical Guide to Global Point-of-Care Testing. CSIRO Publishing, 2016. http://dx.doi.org/10.1071/9781486305193.
Full textExplore It!: Wie Softwareentwickler und Tester Mit Explorativem Testen Risiken Reduzieren und Fehler Aufdecken. dpunkt.verlag, 2014.
Find full textFrontend Web Developer's Guide to Testing: Explore Leading Web Test Automation Frameworks and Their Future Driven by Low-Code and AI. de Gruyter GmbH, Walter, 2022.
Find full textThermal Spray Technology. ASM International, 2022. http://dx.doi.org/10.31399/asm.tb.tstap.9781627084284.
Full texta Frontend Web Developer's Guide to Testing: Explore Leading Web Test Automation Frameworks and Their Future Driven by Low-Code and AI. Packt Publishing, Limited, 2022.
Find full textMeletis, Chris D., and Sara G. Wood. His Change of Life. Greenwood Publishing Group, Inc., 2009. http://dx.doi.org/10.5040/9798400663604.
Full textPollack, Detlef, and Gergely Rosta. Charismatic, Pentecostal, and Evangelical Movements in Europe, the US, and Brazil. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198801665.003.0018.
Full textVanderlee, Mary-Louise. Pilot testing a causal model that includes clusters of parent, child, teacher, and classroon variables, to explore the mechanisms underlying class size effects. 2004.
Find full textToye, John. Conclusion: The last grand narrative of development, 1938–. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198723349.003.0012.
Full textBusch, Danny, and Guido Ferrarini, eds. European Banking Union. 2nd ed. Oxford University Press, 2020. http://dx.doi.org/10.1093/law/9780198827511.001.0001.
Full textD'Arcy, Alexandra. Variation and Change. Edited by Robert Bayley, Richard Cameron, and Ceil Lucas. Oxford University Press, 2013. http://dx.doi.org/10.1093/oxfordhb/9780199744084.013.0024.
Full textSteinmo, Sven. Historical Institutionalism and Experimental Methods. Edited by Orfeo Fioretos, Tulia G. Falleti, and Adam Sheingate. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199662814.013.6.
Full textBalonas, Sara, Teresa Ruão, and María-Victoria Carrillo, eds. Strategic Communication in Context: Theoretical Debates and Applied Research. UMinho Editora/CECS, 2021. http://dx.doi.org/10.21814/uminho.ed.46.
Full textPérez, Efrén O. The Language-Opinion Connection. Edited by Lonna Rae Atkeson and R. Michael Alvarez. Oxford University Press, 2015. http://dx.doi.org/10.1093/oxfordhb/9780190213299.013.18.
Full textMoseley, Mason W. Contentious Engagement. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190694005.003.0003.
Full textCocktail Workbook: Blank Cocktail Recipe Book to Organize Cocktail Ideas, Explore Mixology, and Testing, Space for over 130 Recipes, Perfect Gift for a Bartender, or Aspiring Mixologist. Independently Published, 2021.
Find full text