Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment

Overview

  • Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
  • ...
Extending Docker
Extending Docker

Key Features

  • Get the first book on the market that shows you how to extend the capabilities of Docker using plugins and third-party tools
  • Master the skills of creating various plugins and integrating great tools in order to enhance the functionalities of Docker
  • A practical and learning guide...
Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript
Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript

Learn how to write cross platform React Native code by using effective design patterns in the JavaScript world. Get to know industry standard patterns as well as situational patterns. Decouple your application with these set of “Idea patterns”.

Key Features

  • Mobile development...
Buying at the Point of Maximum Pessimism: Six Value Investing Trends from China to Oil to Agriculture
Buying at the Point of Maximum Pessimism: Six Value Investing Trends from China to Oil to Agriculture

“Sir John’s ability to comprehend complex concepts and distill these into money-making ideas for his investors was legendary. With this book, Scott Phillips extends Sir John Templeton’s crystal clear vision to some of tomorrow’s most interesting and powerful money-making opportunities. All readers...

Real World Instrumentation with Python: Automated Data Acquisition and Control Systems
Real World Instrumentation with Python: Automated Data Acquisition and Control Systems

This is a book about automated instrumentation, and the automated control systems used with automated instrumentation. We will look at how to use the Python programming language to quickly and easily implement automated instrumentation and control systems.

Automated instrumentation can be found in a wide variety of settings,...

Cytokines in Human Health: Immunotoxicology, Pathology, and Therapeutic Applications (Methods in Pharmacology and Toxicology)
Cytokines in Human Health: Immunotoxicology, Pathology, and Therapeutic Applications (Methods in Pharmacology and Toxicology)
Over the past three decades the field of immunotoxicology, the study of the effects of exposure to drugs, chemicals, or physical/environmental agents on the structure and function of the immune system has benefited from an increasingly detailed understanding of the cellular and molecular basis of innate and acquired immunity....
Collaborate or Perish!: Reaching Across Boundaries in a Networked World
Collaborate or Perish!: Reaching Across Boundaries in a Networked World

In Collaborate or Perish! former Los Angeles police chief and New York police commissioner William Bratton and Harvard Kennedy School’s Zachary Tumin lay out a field-tested playbook for collaborating across the boundaries of our networked world. Today, when everyone is connected, collaboration is the game changer. Agencies and...

Troubleshooting Remote Access Networks (CCIE Professional Development)
Troubleshooting Remote Access Networks (CCIE Professional Development)
A guide to understanding the troubleshooting tools, commands, and methodologies that enable reliable performance for remote access services

* Gain a solid grasp of enterprise telecommunications technology fundamentals, including service options and clocking, line coding, and framing in carrier systems
* Understand how network traffic
...

PowerPoint 2007: The Missing Manual
PowerPoint 2007: The Missing Manual

Like every other application in Microsoft Office suite, PowerPoint is loaded with features. So many, in fact, that even veterans don't know where to find them all. Microsoft solved this problem in PowerPoint 2007 by redesigning the user interface with a tabbed toolbar that makes features easy to locate and use. PowerPoint 2007...

Simple Tools and Techniques for Enterprise Risk Management (The Wiley Finance Series)
Simple Tools and Techniques for Enterprise Risk Management (The Wiley Finance Series)
Providing strategic direction for a business means understanding what drives the creation of value and what destroys it. This in turn means the pursuit of opportunities must entail comprehension of the risks to take and the risks to avoid. Hence to grow any business entails risk judgement and risk acceptance. A business’s ability to prosper...
Intelligent Image Processing
Intelligent Image Processing
Intelligent Image Processing describes the EyeTap technology that allows non-invasive tapping into the human eye through devices built into eyeglass frames. This isn't merely about a computer screen inside eyeglasses, but rather the ability to have a shared telepathic experience among viewers. Written by the developer of the EyeTap principle, this...
Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption
Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption
Corporate Resiliency: Managing the Growing Risk of Fraud and Corruption is written for members of boards of directors and audit committees, senior executives, those who advise or report to them, and those responsible for managing fraud and corruption risks. It describes in plain English terms a proactive fraud and corruption risk...
unlimited object storage image
Result Page: 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy