Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Network and System Security, Second Edition
Network and System Security, Second Edition

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of...

Android Security Internals: An In-Depth Guide to Android's Security Architecture
Android Security Internals: An In-Depth Guide to Android's Security Architecture

"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf."—Jon "jcase" Sawyer, from the Foreword

...
Managing the Matrix: The Secret to Surviving and Thriving in Your Organization
Managing the Matrix: The Secret to Surviving and Thriving in Your Organization

A comprehensive guide to excelling in a complex matrix organization

Debra was not in a good mood as she entered Johann’s office for their third meeting. One of her colleagues had just been promoted and, although the guy who got it was good, she didn’t think he was any better than her. Well, except at one...

Hadoop For Dummies
Hadoop For Dummies

Let Hadoop For Dummies help harness the power of your data and rein in the information overload

Big data has become big business, and companies and organizations of all sizes are struggling to find ways to retrieve valuable information from their massive data sets with becoming overwhelmed. Enter Hadoop and this
...

Realtime Data Mining: Self-Learning Techniques for Recommendation Engines (Applied and Numerical Harmonic Analysis)
Realtime Data Mining: Self-Learning Techniques for Recommendation Engines (Applied and Numerical Harmonic Analysis)

​​​​Describing novel mathematical concepts for recommendation engines, Realtime Data Mining: Self-Learning Techniques for Recommendation Engines features a sound mathematical framework unifying approaches based on control and learning theories, tensor factorization, and hierarchical methods. Furthermore, it...

The UX Five-Second Rules: Guidelines for User Experience Design's Simplest Testing Technique
The UX Five-Second Rules: Guidelines for User Experience Design's Simplest Testing Technique

The five-second test is one of the most convenient rapid UX testing methods available, although its value can be compromised by ignoring the restrictions of the method. The Five-Second Rules uses detailed examples from a collection of more than 300 tests to describe the strengths and weaknesses of this rapid testing method. Readers...

Fire in the Valley: The Birth and Death of the Personal Computer
Fire in the Valley: The Birth and Death of the Personal Computer

In the 1970s, while their contemporaries were protesting the computer as a tool of dehumanization and oppression, a motley collection of college dropouts, hippies, and electronics fanatics were engaged in something much more subversive. Obsessed with the idea of getting computer power into their own hands, they launched from their garages a...

Identification of Physical Systems: Applications to Condition Monitoring, Fault Diagnosis, Soft Sensor and Controller Design
Identification of Physical Systems: Applications to Condition Monitoring, Fault Diagnosis, Soft Sensor and Controller Design

Identification of a physical system deals with the problem of identifying its mathematical model using the measured input and output data. As the physical system is generally complex, nonlinear, and its input–output data is corrupted noise, there are fundamental theoretical and practical issues that need to be...

Agile!: The Good, the Hype and the Ugly
Agile!: The Good, the Hype and the Ugly

Are you attracted by the promises of agile methods but put off by the fanaticism of many agile texts? Would you like to know which agile techniques work, which ones do not matter much, and which ones will harm your projects? Then you need Agile!: the first exhaustive, objective review of agile principles, techniques and tools.

...

Evolution in Four Dimensions: Genetic, Epigenetic, Behavioral, and Symbolic Variation in the History of Life (Life and Mind: Philosophical Issues in Biology and Psychology)
Evolution in Four Dimensions: Genetic, Epigenetic, Behavioral, and Symbolic Variation in the History of Life (Life and Mind: Philosophical Issues in Biology and Psychology)

This new edition of the widely read Evolution in Four Dimensions has been revised to reflect the spate of new discoveries in biology since the book was first published in 2005, offering corrections, an updated bibliography, and a substantial new chapter. Eva Jablonka and Marion Lamb's pioneering argument proposes that there is more...

Exam Ref 70-412 Configuring Advanced Windows Server 2012 R2 Services (MCSA)
Exam Ref 70-412 Configuring Advanced Windows Server 2012 R2 Services (MCSA)

Fully updated for Windows Server 2012 R2! Prepare for Microsoft Exam 70-412—and help demonstrate your real-world mastery of advanced configuration tasks for Windows Server infrastructure. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed...

Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2017 LearnIT (support@pdfchm.net) - Privacy Policy