Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Google Hacking for Penetration Testers, Volume 2
Google Hacking for Penetration Testers, Volume 2
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google...
Check Point NGX R65 Security Administration
Check Point NGX R65 Security Administration
Check Point NGX R65 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management solutions. It enables enterprises of all sizes to reduce the cost and complexity...
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover...
Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
The Best Damn Cybercrime and Forensics Book Period
The Best Damn Cybercrime and Forensics Book Period
As is often the case with security compromises, it’s not a matter of if your company will be compromised, but when.

If I had known the employee I hired was going to resign, break into my offi ce, and damage my computers in the span of three days, hindsight being 20/20, I would have sent notifi cation to the security guards at the
...
LEGO Mindstorms Masterpieces: Building Advanced Robots
LEGO Mindstorms Masterpieces: Building Advanced Robots
In LEGO Mindstorm Masterpieces, some of the world's leading LEGO Mindstorms inventors share their knowledge and development secrets. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will include detailed discussions of the mechanics that drive the robot - and...
Netcat Power Tools
Netcat Power Tools
The only book on Netcat, one of the world's most popular open source security tools, used by systems administrators and hackers alike.

Netcat in one of the most commonly used anti-hacking tools in the world. It reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable
...
The Real MCTS/MCITP Exam 70-646 Prep Kit: Independent and Complete Self-Paced Solutions
The Real MCTS/MCITP Exam 70-646 Prep Kit: Independent and Complete Self-Paced Solutions
Independent and unbiased self-paced study with fully integrated book, practice exams, and e-learning modules.

This exam is designed to validate skills as a Windows Server 2008 Server Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-646.

The Microsoft Certified IT
...
The Real MCTS/MCITP Exam 70-647 Prep Kit: Independent and Complete Self-Paced Solutions
The Real MCTS/MCITP Exam 70-647 Prep Kit: Independent and Complete Self-Paced Solutions
Independent and unbiased self-paced study with fully integrated book, practice exams, and e-learning modules.

This exam is designed to validate skills as a Windows Server 2008 Enterprise Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-647.

The Microsoft
...
Nmap in the Enterprise: Your Guide to Network Scanning
Nmap in the Enterprise: Your Guide to Network Scanning
Richard Stiennon, vice president at Gartner
"Nmap is one of the tools in your toolbox you need as a network analyst. I would recommend everyone in the world use it to check port 135 to see if [they] have desktop servers listening on it. If you don't, you're going to be down in the next couple of weeks."

A
...
The Real MCTS/MCITP Exam 70-620 Prep Kit: Independent and Complete Self-Paced Solutions
The Real MCTS/MCITP Exam 70-620 Prep Kit: Independent and Complete Self-Paced Solutions
Independent and unbiased self-paced study with fully integrated book, practice exams, and e-learning modules.

This exam is designed to validate proficieny supporting Windows Vista client. This exam will fulfill the Windows Vista Technology Specialist requirements of Exam 70-620.

The Microsoft Certified Technology
...
The Real MCTS/MCITP Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions
The Real MCTS/MCITP Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions
Independent and unbiased self-paced study with fully integrated book, practice exams, and e-learning modules.

This exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640.

The Microsoft Certified
...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy