Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Tools : Writing, Hacking, and Modifying Security Tools
Network Security Tools : Writing, Hacking, and Modifying Security Tools
This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your...
MCSE Self-Paced Training Kit (Exam 70-297): Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure
MCSE Self-Paced Training Kit (Exam 70-297): Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure
Welcome to MCSE Self-Paced Training Kit (Exam 70-297): Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure. This book teaches you how to gather the network requirements for a business, how to analyze an existing network, and how to...
Designing a Not-for-Profit Compensation System
Designing a Not-for-Profit Compensation System
Designing A Not-For-profit Compensation System

Until now, human resource and compensation professionals in the public/not-for-profit sector didn't have a compensation guidebook specifically for them. Unlike their for-profit counterparts, specialists in the not-for-profit sector wrestle with such questions as:

CCSP SECUR Exam Cram 2 (642-501)
CCSP SECUR Exam Cram 2 (642-501)

Exam Cram 2 fills the needs of 1,000s of Certified Security Specialists and new security cert candidates looking to upgrade to a CCSP.

  • SECUR is the first and most important of the 5 required exams to obtain a CCSP.

  • ...
Computational Intelligence for Movement Sciences: Neural Networks and Other Emerging Techniques
Computational Intelligence for Movement Sciences: Neural Networks and Other Emerging Techniques
Recent years have seen many new developments in computational intelligence (CI) techniques and, consequently, this has led to an exponential increase in the number of applications in a variety of areas, including: engineering, finance, social and biomedical. In particular, CI techniques are increasingly being used in biomedical and human movement...
An Introduction to Knowledge Engineering
An Introduction to Knowledge Engineering
An Introduction to Knowledge Engineering presents a simple but detailed exploration of current and established work in the field of knowledge-based systems and related technologies. Its treatment of the increasing variety of such systems is designed to provide the reader with a substantial grounding in such technologies as expert systems, neural...
CCNP Wireless (642-732 CUWSS) Quick Reference (2nd Edition)
CCNP Wireless (642-732 CUWSS) Quick Reference (2nd Edition)
Conducting a wireless site survey is the final step of a carefully planned journey. Before rushing to the facility to be surveyed with your laptop and some access points (APs), however, you must collect information about the purpose of the required wireless coverage. This chapter helps you prepare for this site survey by listing the...
Delivering E-Learning: A Complete Strategy for Design, Application and Assessment
Delivering E-Learning: A Complete Strategy for Design, Application and Assessment

The current way most people look at e-learning is flawed, and this means they are missing its full potential. Delivering E-Learning describes a new and better way of understanding e-learning. Kenneth Fee looks at objections to e-learning and poor past practice before presenting a new strategic approach. Fee places the...

Managing Information Technology Projects: Applying Project Management Strategies to Software, Hardware, and Integration Initiatives
Managing Information Technology Projects: Applying Project Management Strategies to Software, Hardware, and Integration Initiatives

With software and hardware development techniques improving constantly, it’s surprising to learn that more than half of all technology projects overrun their schedules and budgets by 200 percent or more. Computerworld magazine recently reported several surveys showing that project failure is overwhelmingly traceable to poorly...

Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

The Business Case For E-Learning
The Business Case For E-Learning

Realize productivity gains from network-driven communication, training, and assessment

The Business Case for E-Learning is the first book that demonstrates the productivity gains provided by Internet learning through a unique approach combining e-communication,...

UNIX System Administration: A Beginner's Guide
UNIX System Administration: A Beginner's Guide

Essential Skills Made Easy!

Learn the fundamentals of UNIX administration--from both a network and single system perspective--using this easy-to-follow introductory guide. You'll find clear instructions for setting up such important system services sas DNS, FTP, file systems, basic security tools, and much more. Designed for easy...

unlimited object storage image
Result Page: 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy