Buy linux-fans.com ?

Products related to Testing:


  • Learning Kali Linux : Security Testing, Penetration Testing & Ethical Hacking
    Learning Kali Linux : Security Testing, Penetration Testing & Ethical Hacking

    With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for penetration testers and other professionals to get started with security testing quickly.But with more than 600 tools in its arsenal, the Kali Linux can also be overwhelming.The new edition of this practical book covers updates to the tools, including deeper coverage of reverse engineering. Author Ric Messier, principal security consultant with Mandiant, also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis.You'll also find review questions throughout the book to help you test your knowledge as you learn. Explore the breadth of tools available on Kali LinuxUnderstand the value of security testing and examine the testing types availableLearn the basics of penetration testing through the entire attack lifecycleInstall Kali Linux on multiple systems, both physical and virtualDiscover how to use different security-focused toolsStructure a security test around Kali Linux toolsExtend Kali tools to create advanced attack techniquesUse Kali Linux to generate reports once testing is complete

    Price: 47.99 £ | Shipping*: 0.00 £
  • Kali Linux Penetration Testing Bible
    Kali Linux Penetration Testing Bible

    Your ultimate guide to pentesting with Kali Linux Kali is a popular and powerful Linux distribution used by cybersecurity professionals around the world.Penetration testers must master Kali’s varied library of tools to be effective at their work.The Kali Linux Penetration Testing Bible is the hands-on and methodology guide for pentesting with Kali. You’ll discover everything you need to know about the tools and techniques hackers use to gain access to systems like yours so you can erect reliable defenses for your virtual assets.Whether you’re new to the field or an established pentester, you’ll find what you need in this comprehensive guide. Build a modern dockerized environmentDiscover the fundamentals of the bash language in LinuxUse a variety of effective techniques to find vulnerabilities (OSINT, Network Scan, and more)Analyze your findings and identify false positives and uncover advanced subjects, like buffer overflow, lateral movement, and privilege escalationApply practical and efficient pentesting workflowsLearn about Modern Web Application Security Secure SDLCAutomate your penetration testing with Python

    Price: 32.00 £ | Shipping*: 0.00 £
  • Kali Linux Wireless Penetration Testing: Beginner's Guide
    Kali Linux Wireless Penetration Testing: Beginner's Guide

    About This BookLearn wireless penetration testing with Kali Linux; Backtrack's evolutionDetect hidden wireless networks and discover their namesExplore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffingDevelop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacksWho This Book Is ForIf you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you.Some familiarity with Kali Linux and wireless concepts is beneficial.

    Price: 35.99 £ | Shipping*: 0.00 £
  • Linux Kernel Development
    Linux Kernel Development

    Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding. The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces.It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel.Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques.This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. The third edition of Linux Kernel Development includes new and updated material throughout the book: An all-new chapter on kernel data structuresDetails on interrupt handlers and bottom halvesExtended coverage of virtual memory and memory allocationTips on debugging the Linux kernelIn-depth coverage of kernel synchronization and lockingUseful insight into submitting kernel patches and working with the Linux kernel community

    Price: 36.99 £ | Shipping*: 0.00 £
  • Learning eBPF : Programming the Linux Kernel for Enhanced Observability, Networking, and Security
    Learning eBPF : Programming the Linux Kernel for Enhanced Observability, Networking, and Security

    What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves.It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works.Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves. With this book, you will:Learn why eBPF has become so important in the past couple of yearsWrite basic eBPF code, and manipulate eBPF programs and attach them to eventsExplore how eBPF components interact with Linux to dynamically change the operating system's behaviorLearn how tools based on eBPF can instrument applications without changes to the apps or their configurationDiscover how this technology enables new tools for observability, security, and networking

    Price: 44.99 £ | Shipping*: 0.00 £
  • Understanding the Linux Kernel
    Understanding the Linux Kernel

    In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel.The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order.It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn't kept waiting any longer than necessary for the relatively slow disks.The third edition of Understanding the Linux Kernel takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel.Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line.But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does.This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices.The book focuses on the following topics: * Memory management, including file buffering, process swapping, and Direct memory Access (DMA) * The Virtual Filesystem layer and the Second and Third Extended Filesystems * Process creation and scheduling * Signals, interrupts, and the essential interfaces to device drivers * Timing * Synchronization within the kernel * Interprocess Communication (IPC) * Program execution Understanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise.You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments.This book will help you make the most of your Linux system.

    Price: 55.99 £ | Shipping*: 0.00 £
  • Ai-Assisted Programming : Better Planning, Coding, Testing, and Deployment
    Ai-Assisted Programming : Better Planning, Coding, Testing, and Deployment

    Get practical advice on how to leverage AI development tools for all stages of code creation, including requirements, planning, and design; coding; and debugging, testing, and documentation.With this practical book, beginners and experienced developers alike will learn how to use a wide range of tools, from general-purpose LLMs (ChatGPT, Bard, and Claude) to code-specific systems (GitHub Copilot, Tabnine, Cursor, and Amazon CodeWhisperer). You'll also learn about more specialized generative AI tools for tasks such as text-to-image creation. Author Tom Taulli provides a methodology for modular programming that aligns effectively with the way prompts create AI-generated code.This guide also describes the best ways of using general purpose LLMs to learn a programming language, explain code, or convert code from one language to another. This book examines:The core capabilities of AI-based development toolsPros, cons, and use cases of popular systems such as GitHub Copilot and Amazon CodeWhispererWays to use ChatGPT, Bard, Claude, and other generic LLMs for codingUsing AI development tools for the software development lifecycle, including requirements, planning, coding, debugging, and testingPrompt engineering for developmentUsing AI-assisted programming for tedious tasks like creating regular expressions making chron jobs and GitHub ActionsHow to use AI-based low-code and no-code tools

    Price: 55.99 £ | Shipping*: 0.00 £
  • Just Testing
    Just Testing


    Price: 6.99 £ | Shipping*: 3.99 £

Similar search terms for Testing:


  • What is the difference between Blackbox Testing and Whitebox Testing in programming?

    Blackbox testing is a software testing method where the internal logic and structure of the code being tested are not known to the tester. The tester focuses on the functionality of the software without looking at its internal workings. On the other hand, Whitebox testing is a testing method where the tester has knowledge of the internal code, structure, and implementation details of the software being tested. This allows the tester to design test cases based on the internal logic of the code. In summary, Blackbox testing is focused on the external behavior of the software, while Whitebox testing is focused on the internal structure and logic of the software.

  • What is the difference between black-box testing and white-box testing in programming?

    Black-box testing focuses on testing the functionality of a program without knowledge of its internal code structure. Testers only interact with the program's inputs and outputs to verify if it behaves as expected. On the other hand, white-box testing involves testing the internal logic and structure of the program. Testers have access to the code and use this knowledge to design test cases that ensure all paths and conditions within the code are tested. In summary, black-box testing is more focused on the external behavior of the program, while white-box testing is focused on the internal implementation details.

  • Is app testing or product testing legitimate?

    Yes, both app testing and product testing are legitimate practices. App testing involves evaluating the functionality, usability, and performance of a mobile application to ensure it meets quality standards before it is released to the public. Product testing, on the other hand, involves assessing the quality, safety, and effectiveness of physical products before they are brought to market. Both types of testing are essential for ensuring that consumers have access to reliable and high-quality products and applications.

  • Is testing carcinogenic?

    Testing itself is not carcinogenic. However, certain substances used in testing, such as certain chemicals or radiation, can be carcinogenic. It is important to ensure that proper safety measures are in place when conducting any testing to minimize the risk of exposure to carcinogenic substances. Additionally, regular monitoring and assessment of potential risks should be conducted to protect the health and safety of those involved in testing processes.

  • What is the difference between material testing and component testing?

    Material testing involves evaluating the physical and mechanical properties of a material, such as its strength, hardness, and elasticity, to determine its suitability for a specific application. Component testing, on the other hand, involves testing a specific part or component of a larger system to ensure it meets performance and safety requirements. While material testing focuses on the properties of the material itself, component testing focuses on the performance and reliability of a specific part within a larger system. Both types of testing are important for ensuring the quality and safety of products and structures.

  • How about animal testing?

    Animal testing is a controversial topic with valid arguments on both sides. Proponents argue that it is necessary for medical and scientific research, as it can lead to important discoveries and advancements in medicine. However, opponents argue that it is unethical to subject animals to pain and suffering for human benefit, and that there are alternative methods available. Ultimately, it is important to carefully consider the ethical implications and weigh the potential benefits against the harm caused to animals.

  • Which distro do you use, Linux users?

    As an AI, I do not have personal preferences or the ability to use operating systems. However, Linux users often choose their distribution based on their specific needs and preferences. Some popular distributions include Ubuntu for its user-friendly interface, Fedora for its focus on the latest technologies, and Debian for its stability and reliability. Ultimately, the choice of distribution depends on the user's requirements and level of expertise.

  • What are three advantages of using testing equipment in a testing room?

    Using testing equipment in a testing room offers several advantages. Firstly, it ensures accuracy and precision in the testing process, as the equipment is designed to provide reliable and consistent results. Secondly, it allows for efficient and streamlined testing procedures, saving time and resources. Lastly, testing equipment often comes with advanced features and capabilities that can provide valuable insights and data for analysis, helping to improve the overall quality of testing outcomes.

* All prices are inclusive of VAT and, if applicable, plus shipping costs. The offer information is based on the details provided by the respective shop and is updated through automated processes. Real-time updates do not occur, so deviations can occur in individual cases.