Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment

Overview

  • Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
  • ...
Enterprise Content and Search Management for Building Digital Platforms
Enterprise Content and Search Management for Building Digital Platforms

Provides modern enterprises with the tools to create a robust digital platform utilizing proven best practices, practical models, and time-tested techniques

Contemporary business organizations can either embrace the digital revolution—or be left behind. Enterprise Content and Search Management for Building Digital...

User-Centered Agile Method
User-Centered Agile Method

Agile development methods began to emerge around 20 years ago. However, it was not until the early 2000s that they began to be widely used in industry. This growth was often due to the advent of Internet services requiring faster cycles of development in order to heighten the rate at which an ever-greater number of functionalities...

Modern Image Quality Assessment (Synthesis Lectures on Image, Video, & Multimedia Processing)
Modern Image Quality Assessment (Synthesis Lectures on Image, Video, & Multimedia Processing)
This book is about objective image quality assessment—where the aim is to provide computational models that can automatically predict perceptual image quality. The early years of the 21st century have witnessed a tremendous growth in the use of digital images as a means for representing and communicating information. A considerable percentage...
Brain Metastases (Cancer Treatment and Research)
Brain Metastases (Cancer Treatment and Research)
Brain metastases are among the most feared and debilitating complication of systemic cancer. They impact approximately 170 000 patients a year in the United States, a number ten-fold greater than malignant gliomas. Historically, brain metastases were diagnosed in patients with widespread systemic malignancy. Recent improvements...
Health and Environmental Safety of Nanomaterials: Polymer Nancomposites and Other Materials Containing Nanoparticles (Woodhead Publishing Series in Composites Science and Engineering)
Health and Environmental Safety of Nanomaterials: Polymer Nancomposites and Other Materials Containing Nanoparticles (Woodhead Publishing Series in Composites Science and Engineering)

Health and Environmental Safety of Nanomaterials addresses concerns about the impact of nanomaterials on the environment and human health, and examines the safety of specific nanomaterials. Understanding the unique chemical and physical properties of nanostructures has led to many developments in the applications of nanocomposite...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Cato the Younger: Life and Death at the End of the Roman Republic
Cato the Younger: Life and Death at the End of the Roman Republic
Marcus Porcius Cato ("the Younger") is most famous for being Julius Caesar's nemesis. His sustained antagonism was in large part responsible for pushing the Romans towards civil war. Yet Cato never wanted war even though he used the threat of violence against Caesar. This strategic gamble misfired as Caesar, instead of...
Infrared Spectroscopy: Fundamentals and Applications (Analytical Techniques in the Sciences)
Infrared Spectroscopy: Fundamentals and Applications (Analytical Techniques in the Sciences)
Analytical Techniques in the Sciences

This series of books provides coverage of all of the major analytical techniques and their application in the most important areas of physical, life and materials science. Each text is presented in an open learning/distance learning style, in which the learning objectives are clearly identified. The...

Assessing the Accuracy of Remotely Sensed Data: Principles and Practices, Second Edition (Mapping Science)
Assessing the Accuracy of Remotely Sensed Data: Principles and Practices, Second Edition (Mapping Science)
The field of assessing the accuracy of maps derived from remotely sensed data has continued to develop and mature since the first edition of this book was published in 1999. The original eight chapters have been expanded to eleven. Of most significance is a new chapter that covers positional accuracy. The accuracy of any spatial data set is a...
Service-Oriented Computing: ICSOC 2010 International Workshops PAASC
Service-Oriented Computing: ICSOC 2010 International Workshops PAASC

Welcome to the workshop program of the 8th International Conference on Service Oriented Computing (ICSOC 2010), held in San Francisco, December 2010. These workshop proceedings represent high-quality research and industry papers that showcase recent and new working developments in service-oriented computing and related fields.

...

Investing in Shares For Dummies
Investing in Shares For Dummies
Houses, gold, tulips . . . our idea of what constitutes a good ‘investment’ has changed dramatically over time but one precious, valuable idea still holds true: that shares over the long term have been a great investment and have without doubt made their intrepid ‘holders’ returns of between 5 and 7 per...
unlimited object storage image
Result Page: 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy