Apress – Intermediate Swift iOS App Development With UIKIT-iLLiTERATE
English | Size: 972.02 MB
Category: Tutorial
iLLiTERATE
Packt – Automation Framework Design Using TestNG
Packt – Automation Framework Design Using TestNG-iLLiTERATE
English | Size: 3.28 GB
Category: Tutorial
This course will take you through the basics as well as advanced concepts in TestNG and automation framework building.
You’ll start with the basic annotations in testing, and cover test execution management and automation framework design. You’ll then delve into the page object model, a modern design pattern, and Page Factory – a useful tool. As you progress, you’ll cover the advanced concepts of TestNG and the annotations in it. Finally, you’ll get to grips with running tests in parallel and data-driven testing.
Packt – Complete 2020 AWS DevOPs Bootcamp for Beginners With ECS
Packt – Complete 2020 AWS DevOPs Bootcamp for Beginners With ECS-iLLiTERATE
English | Size: 6.10 GB
Category: Tutorial
The rising popularity of AWS and DevOps is testimony to the fact that companies are able to build and deploy products speedily and reliably using AWS and DevOps practices. This course is packed with hands-on and practical labs which will help you to build real-world projects.
Packt – Linux Server Administration Made Easy With Hands-on Training
Packt – Linux Server Administration Made Easy With Hands-on Training-iLLiTERATE
English | Size: 1.03 GB
Category: Tutorial
Fedora has been updated to version 31. Some of the background images and icons have changed but the command syntax used in the labs remains constant.
Apress – SQL Injection Attacks Protect Your System From Vulnerabilities
Apress – SQL Injection Attacks Protect Your System From Vulnerabilities-iLLiTERATE
English | Size: 259.22 MB
Category: Tutorial
Explore a preview version of SQL Injection Attacks: Protect Your System from Vulnerabilities right now.
This video takes you through everything you need to understand SQL injection and how to prepare for attacks as well as how to prevent them. It covers vulnerable website links, basic injection attacks, database and table name discovery, and data extraction. It’s everything an ethical hacker needs to know about a SQL injection attack.