Home | Amazing | Today | Tags | Publishers | Years | Search 
Use of Force: A Thriller (The Scot Harvath Series)
Use of Force: A Thriller (The Scot Harvath Series)

“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy

From #1 New York Times bestselling author Brad Thor.

As a storm rages across the Mediterranean Sea, a
...

Peripheral Arterial Disease: Diagnosis and Treatment (Contemporary Cardiology)
Peripheral Arterial Disease: Diagnosis and Treatment (Contemporary Cardiology)

Recognized experts comprehensively review the clinical, surgical, radiological, and scientific aspects of atherosclerotic peripheral arterial disease (PAD), including endovascular, gene, and drug therapies. In their far-ranging discussions, the authors examine in depth the risk factors and antiplatelet therapies for PAD patients at high risk...

Linux Server Security: Hack and Defend
Linux Server Security: Hack and Defend

Learn how to attack and defend the world’s most popular web server platform

Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server...

The Lost Boyz: A Dark Side of Graffiti
The Lost Boyz: A Dark Side of Graffiti

At age 14, author Justin Rollins went from being a bullied child to the leader of The Warriorz, a group of London street kids involved in graffiti tagging and other crimes, including a series of violent encounters. Eventually given a substantial custodial sentence for an attack with a meat cleaver in the London Underground, Rollins became...

Becoming Immortal: Combining Cloning and Stem-Cell Therapy
Becoming Immortal: Combining Cloning and Stem-Cell Therapy
Expecting to relax during a routine flight home, I casually glanced through the contents of the airline’s magazine and practically suffered a heart attack. The first feature article was entitled, “How to Live Forever”! Believing for a moment that Becoming Immortal had been scooped, I tore through the magazine...
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement...

Warfare and Weaponry in Dynastic Egypt
Warfare and Weaponry in Dynastic Egypt

Defence. Attack. Symbolism. The development of warfare in any society provides an evocative glance into the lives (and deaths) of our predecessors. This is never more the case than with that most enticing of ancient civilizations, Ancient Egypt. Follow Rebecca Dean through the fascinating world of mysterious figures such as...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy