Mobile Hacker

The Mobile Application Hacker's Handbook (repost)  eBooks & eLearning

Posted by roxul at April 19, 2017
The Mobile Application Hacker's Handbook (repost)

Dominic Chell and Tyrone Erasmus, "The Mobile Application Hacker's Handbook"
English | ISBN: 1118958500 | 2015 | 816 pages | EPUB | 6 MB

The Mobile Application Hacker's Handbook  eBooks & eLearning

Posted by nebulae at April 18, 2017
The Mobile Application Hacker's Handbook

Dominic Chell and Tyrone Erasmus, "The Mobile Application Hacker's Handbook"
English | ISBN: 1118958500 | 2015 | 816 pages | PDF | 42 MB

Udemy – Become a Mobile App Growth Hacker. Total Theory and Training  eBooks & eLearning

Posted by naag at Sept. 11, 2015
Udemy – Become a Mobile App Growth Hacker. Total Theory and Training

Udemy – Become a Mobile App Growth Hacker. Total Theory and Training
MP4 | Video: 1280x720 | 60 kbps | 48 KHz | Duration: 4 Hours | 1.29 GB
Genre: eLearning | Language: English

Complete guide on theory and elite techniques to increase app downloads and increase user retention to maximize profit.

The Mobile Application Hacker's Handbook  eBooks & eLearning

Posted by nebulae at April 5, 2015
The Mobile Application Hacker's Handbook

Dominic Chell and Tyrone Erasmus, "The Mobile Application Hacker's Handbook"
English | ISBN: 1118958500 | 2015 | 816 pages | EPUB | 6 MB
C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking an

C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking and Mobile Hacking
2017 | English | ISBN-10: 1542787890 | 250 pages | PDF + EPUB (conv) | 2.79 Mb

Certified Ethical Hacker (CEH) Foundation Guide  eBooks & eLearning

Posted by hill0 at April 5, 2017
Certified Ethical Hacker (CEH) Foundation Guide

Certified Ethical Hacker (CEH) Foundation Guide by Sagar Rahalkar
English | 15 Dec. 2016 | ISBN: 1484223241 | 224 Pages | EPUB/MOBI | 5.69 MB

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.

Learning Path Design for Mobile  eBooks & eLearning

Posted by FenixN at Feb. 6, 2017
Learning Path Design for Mobile

Learning Path Design for Mobile
HDRips | MP4/AVC, ~1468 kb/s | 1280x720 | Duration: 12:52:55 | English: AAC, 128 kb/s (2 ch) | 4.13 GB
Genre: Development / Programming

What happens when people use a smartphone to connect with your website or application? Are they delighted or frustrated? With more than a million touch-screen phones shipping every day, it’s vital that you design your site to appeal to the mobile crowd. This Learning Path will teach you how.

Certified Ethical Hacker (CEH) Foundation Guide  eBooks & eLearning

Posted by nebulae at Jan. 26, 2017
Certified Ethical Hacker (CEH) Foundation Guide

Sagar Rahalkar, "Certified Ethical Hacker (CEH) Foundation Guide"
English | ISBN: 1484223241 | 2017 | 224 pages | PDF | 12 MB

CEH v9: Certified Ethical Hacker Version 9 Practice Tests  eBooks & eLearning

Posted by libr at Jan. 20, 2017
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

CEH v9: Certified Ethical Hacker Version 9 Practice Tests by Raymond Blockmon
English | 2016 | ISBN: 1119252156 | 192 pages | EPUB | 3,3 MB

ITPro.TV - Certified Ethical Hacker CEH v9  eBooks & eLearning

Posted by FenixN at Jan. 18, 2017
ITPro.TV - Certified Ethical Hacker CEH v9

ITPro.TV - Certified Ethical Hacker CEH v9
HDRips | MP4/AVC, ~3409 kb/s | 1920x1076 | Duration: 33:37:36 | English: AAC, 256 kb/s (2 ch) | 42.9 GB
Genre: Development / Programming / Security

EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.