Home | Amazing | Today | Tags | Publishers | Years | Search 
Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and...

Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Cyber Conflict: Competing National Perspectives
Cyber Conflict: Competing National Perspectives

Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how...

Security Issues in Mobile NFC Devices (T-Labs Series in Telecommunication Services)
Security Issues in Mobile NFC Devices (T-Labs Series in Telecommunication Services)

This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the...

Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)
Automatic Malware Analysis: An Emulator Based Approach (SpringerBriefs in Computer Science)

Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples are discovered daily. Even worse, malware is rapidly evolving becoming more sophisticated and evasive to strike against current malware...

Cognitive Communication and Cooperative HetNet Coexistence: Selected Advances on Spectrum Sensing, Learning, and Security Approaches (Signals and Communication Technology)
Cognitive Communication and Cooperative HetNet Coexistence: Selected Advances on Spectrum Sensing, Learning, and Security Approaches (Signals and Communication Technology)

This book, written by experts from universities and major industrial research laboratories, is devoted to the very hot topic of cognitive radio and networking for cooperative coexistence of heterogeneous wireless networks. Selected highly relevant advanced research is presented on spectrum sensing and progress toward the realization of...

Practical Aviation Security, Second Edition: Predicting and Preventing Future Threats (Butterworth-Heinemann Homeland Security)
Practical Aviation Security, Second Edition: Predicting and Preventing Future Threats (Butterworth-Heinemann Homeland Security)

The second edition of Practical Aviation Security is a complete guide to the aviation security system, from crucial historical events to the policies, policymakers, and major terrorist and criminal acts that have shaped the procedures in use today. The tip-of-the-spear technologies that are shaping the future are also addressed.

...
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran
Power, National Security, and Transformational Global Events: Challenges Confronting America, China, and Iran

As the United States struggled to survive the recent recession, China quietly acquired a vast amount of U.S. Treasury bills and bonds. With China now holding so much of America’s debt, currency valuation issues have already caused tensions between the two superpowers. Couple this with Iran’s efforts to develop into a nuclear power...

Dynamic SQL: Applications, Performance, and Security
Dynamic SQL: Applications, Performance, and Security

This book is an introduction and deep-dive into the many uses of dynamic SQL in Microsoft SQL Server. Dynamic SQL is key to large-scale searching based upon user-entered criteria. It’s also useful in generating value-lists, in dynamic pivoting of data for business intelligence reporting, and for customizing database objects and querying...

Oracle Application Express Administration: For DBAs and Developers
Oracle Application Express Administration: For DBAs and Developers

Succeed in managing Oracle Application Express (APEX) environments. This book focuses on creating the right combination of scalability, high-availability, backup and recovery, integrity, and resource control. The book covers everything from simple to enterprise-class deployments, with emphasis on enterprise-level requirements and coverage of...

Waging War on Complexity Costs: Reshape Your Cost Structure, Free Up Cash Flows and Boost Productivity by Attacking Process, Product and Organizational Complexity
Waging War on Complexity Costs: Reshape Your Cost Structure, Free Up Cash Flows and Boost Productivity by Attacking Process, Product and Organizational Complexity

Shed Revenue-Draining Complexity Costs by Thirty Percent!

“This is an ambitious book packed with insight and fresh thinking. Separating good from bad complexity costs is a critical task facing companies today, and the authors provide a compelling roadmap for solving the problem.”
Michael B.
...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy