Code With Mosh – Data Structures & Algorithms Part 1 2019-8

Code With Mosh – Data Structures & Algorithms Part 1 2019-8
English | Size: 5.99 GB
Category: Programming


Studied Computer Science – but never really understood the complex topic of data structures and algorithms?
Or maybe you’re a self-taught programmer, with little to no knowledge of this important topic.
Or perhaps you failed a job interview because you couldn’t answer basic data structure and algorithm questions.
So, why are data structures so important these days? [Read more…]

Manage and Deploy Code with AWS Developer Tools

Manage and Deploy Code with AWS Developer Tools
English | Size: 3.49 GB
Category: Tutorial


Thomas Haslett really nails this course down and its something i have wanted for a long time. I have read various books on using Git and CI/CD but never really GOT IT (im a Cisco engineer) however this course is just amazing all the lighbulbs started going off as i followe him step by step. A sub to LA is worth it just for this instructors offerings as his AWS courses are second to none. [Read more…]

Pluralsight – Making Your Java Code More Object oriented

Pluralsight – Making Your Java Code More Object oriented-BOOKWARE-KNiSO
English | Size: 247.83 MB
Category: Tutorial


Release Notes: Procedural code can be replaced with objects to increase correctness, flexibility, and maintainability. In this course, Making Your Java Code More Object-oriented, you ll learn how to design truly object-oriented classes in the Java programming language. First, you ll learn how to represent a discrete object state and behavior to avoid imperative branching constructs. Next, you ll discover that null references are a needless pain. Finally, you’ll explore
alternatives to null – substitute objects and optional objects. When you’re finished with this course, you ll have the skills and knowledge of designing classes that avoid traditional imperative constructs, with features resulting from orchestrating well-encapsulated objects rich in behavior [Read more…]

Packt – Assembly Programming for All Platforms Learn to Code

Packt – Assembly Programming for All Platforms Learn to Code-JGTiSO
English | Size: 554.20 MB
Category: Tutorial


Learn
Assembly Design & Development
Assembly Programming
Low-Level Coding
Raspberry Pi Programming
x86 Programming
64-bit Programming
Application Programming
Cross-Platform Development
The semantics of General Programming
The Format of Coding Applications
All The Features of Assembly
[Read more…]

Larry Williams – Cracking the Money Code

Larry Williams – Cracking the Money Code
English | Size: 7.71 GB
Category: Tutorial


Learn the basics of what legendary trader Larry Williams has used to trade with for over 40 years. This material is not available anywhere else, only in this course. It has been used and proven by thousands. You get five incredible hours with Larry (4 hours of video and 1 hour audio), teaching you his secrets to trading plus much much more. Here is just some of what you will learn:
[Read more…]

PluralSight – Malware Analysis Identifying and Defeating Code Obfuscation

PluralSight – Malware Analysis Identifying and Defeating Code Obfuscation
English | Size: 367.44 MB
Category: Tutorial


Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. These techniques can prevent the discovery of important indicators of compromise and limit the ability to determine malware functionality. In this course, Malware Analysis: Identifying and Defeating Code Obfuscation, you will gain the skills necessary to not only identify prevalent obfuscation techniques but also how to effectively defeat them. First, you will see how obfuscation will affect your analysis and effective strategies for defeating a variety of obfuscation methods. Next, you will explore how to identify and detect obfuscation techniques in interpreted code. This includes software routinely abused by malware authors such as Powershell and Visual Basic for Applications. You will next be able to expand your skills by learning about code obfuscation in native code. Finally, you will discover how malware authors use cryptography for obfuscation and ways to detect it. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware obfuscation techniques with such tools as IDA Pro and WinDbg. By the end of this course, you will have the knowledge and skills to effectively tackle obfuscation! [Read more…]

Packt – How Web Hackers Make Big Money Remote Code Execution

Packt – How Web Hackers Make Big Money Remote Code Execution-JGTiSO
English | Size: 178.16 MB
Category: Tutorial


Learn
Learn how hackers earn a 5-digit reward ($$$$$) per single RCE (Remote Code Execution)
Explore different types of RCE attacks
Discover how to find these RCEs step-by-step in practice (Demos)
Become a successful bug hunter
Learn from one of the top hackers at HackerOne
About
Remote Code Execution (RCE) is the most dangerous vulnerability, because it allows the attacker to take control over the entire vulnerable machine. Due to the severity of this vulnerability, some companies pay a 5-digit ($$$$$) reward per single RCE in bug bounty programs, which is just amazing. [Read more…]

PluralSight – Microsoft Azure DevOps Engineer Monitoring Code Quality

PluralSight – Microsoft Azure DevOps Engineer Monitoring Code Quality-ViGOROUS
English | Size: 149.39 MB
Category: Tutorial


Creating and maintaining code quality is one of the most valuable jobs a build engineer performs. In this course, Microsoft Azure DevOps Engineer: Monitoring Code Quality, you will gain the ability to execute code quality checks in your build. First, you will learn static analysis of your codebase. Next, you will discover dynamic analysis, where to execute the code and measure the results. Finally, you will explore how to test your code for security and performance. When you’re finished with this course, you will have the skills and knowledge of integrating code quality checks in your Azure builds needed to take your application quality to the next level. [Read more…]

Packt – How Web Hackers Make Big Money Remote Code Execution

Packt – How Web Hackers Make Big Money Remote Code Execution
English | Size: 176.38 MB
Category: HACKING


Learn
Learn how hackers earn a 5-digit reward ($$$$$) per single RCE (Remote Code Execution)
Explore different types of RCE attacks
Discover how to find these RCEs step-by-step in practice (Demos)
Become a successful bug hunter
Learn from one of the top hackers at HackerOne
About
Remote Code Execution (RCE) is the most dangerous vulnerability, because it allows the attacker to take control over the entire vulnerable machine. Due to the severity of this vulnerability, some companies pay a 5-digit ($$$$$) reward per single RCE in bug bounty programs, which is just amazing. [Read more…]

PluralSight – Malware Analysis Identifying and Defeating Code Obfuscation

PluralSight – Malware Analysis Identifying and Defeating Code Obfuscation-BOOKWARE-KNiSO
English | Size: 248.49 MB
Category: Tutorial


Release Notes: Malware authors will routinely utilize obfuscation techniques to complicate the analysis of their code. These techniques can prevent the discovery of important indicators of compromise and limit the ability to determine malware functionality. In this course, Malware Analysis: Identifying and Defeating Code Obfuscation, you will gain the skills necessary to not only identify prevalent obfuscation techniques but also how to effectively defeat them. First, you will see how obfuscation will affect your analysis and effective strategies for defeating a variety of obfuscation methods. Next, you will explore how to identify and detect obfuscation techniques in interpreted code. This includes software routinely abused by malware authors such as Powershell and Visual Basic for Applications. You will next be able to expand your skills by learning about code obfuscation in native code. Finally, you will discover how malware authors use cryptography for obfuscation and ways to detect it. Each module of this course will include detailed demonstrations and hands-on labs that will allow you to analyze real-world malware. You will be going deep into malware obfuscation techniques with such tools as IDA Pro and WinDbg. By the end of this course, you will have the knowledge and skills to effectively tackle obfuscation! [Read more…]