C++ Applicationshttps://www.stroustrup.com/applications.html
Object-Oriented methodologies and tools. It consists of roughly 500K lines of code and includes the implementation of a rather wide set of state-of-the-art algorithms and theoreti
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
Web Application Testing Methodologies" ZeroSec's "LTR101: WebAppTesting - Methods to the Madness" ZeroSec's "Web Application Testing - Tooling" Mr. Nakup3nda's "Successfully Hack
How to become a bug-bounty hunter and do penetration testing
Steven Pembertonhttps://homepages.cwi.nl/~steven/
of software engineering methodologies, and the study of human-computer interaction. Pemberton is a highly respected figure in the academic community, and has received numerous awa
Big Ball of Mudhttps://www.laputan.org/mud/mud.html
processes and methodologies that endure, in various guises, to this day. We can do worse that examine the forces that led to its original development. In the days before waterfall
While much attention has been focused on high-level software architectural patterns,what is, in effect, the de-facto standard software architecture is seldom discussed. Thispaper e
Find more...