Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
Choked: Life and Breath in the Age of Air Pollution
Choked: Life and Breath in the Age of Air Pollution
Nothing is as elemental, as essential to human life, as the air we breathe. Yet around the world, in rich countries and poor ones, it is quietly poisoning us. 

Air pollution prematurely kills seven million people every year, including more than one hundred thousand Americans. It is strongly linked to
...
InfoSecurity 2008 Threat Analysis
InfoSecurity 2008 Threat Analysis
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess...
Business Continuity and Disaster Recovery Planning for IT Professionals
Business Continuity and Disaster Recovery Planning for IT Professionals
Increase Your Companys Odds of Surviving a Major Disaster

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia These headlines not only have caught the attention of people around the world, they have had a
...
Advances in Enterprise Information Technology Security (Premier Reference)
Advances in Enterprise Information Technology Security (Premier Reference)
In the last decade information and computer security is mainly moving from the confines of academia to the enterprise concerns. As populations become more and more comfortable with the extensive use of networks and the Internet, as our reliance on the knowledge-intensive technology grows, and as progress in the computer software and wireless...
Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne
Cryptographic Hardware and Embedded Systems - CHES 2009: 11th International Workshop Lausanne

CHES 2009, the 11th workshop on Cryptographic Hardware and Embedded Systems, was held in Lausanne, Switzerland, September 6–9, 2009. The workshop was sponsored by the International Association for Cryptologic Research (IACR).

The workshop attracted a record number of 148 submissions from 29 countries, of which the...

Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004
Advanced Encryption Standard - AES: 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004
This book constГ­tutes the thoroughly refereed postproceedings of the 4th International Conference on the Advanced Encryption Standard, AES 2004, held in Bonn, Germany in May 2004. The 10 revised full papers presented together with an introductory survey and 4 invited papers by leading researchers were carefully selected during two rounds of...
Broadband Network Architectures: Designing and Deploying Triple-Play Services
Broadband Network Architectures: Designing and Deploying Triple-Play Services
“Network professionals who are looking to deploy triple-play service provider networks will find this book a useful tool.”

–Michael Newbery, IP Architect, TelstraClear Limited

 

“This book provides a wealth of information on current and...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Secure Computer and Network Systems: Modeling, Analysis and Design
Secure Computer and Network Systems: Modeling, Analysis and Design

Secure Computer and Network Systems

Modeling, Analysis and Design

Nong Ye, Arizona State University, USA

Computer and network systems have given us unlimited opportunities of reducing cost, improving efficiency, and increasing revenues, as demonstrated by...

Securing LINUX Step by Step
Securing LINUX Step by Step
This guide is intended for the novice home user and the experienced systems administrator alike. It covers the installation and operation of Linux in two basic modes of operation: as a workstation and as a server. It does not cover configuring Linux for some of the other special-purpose functions that it performs so well, such as routers,...
Encryption for Digital Content (Advances in Information Security)
Encryption for Digital Content (Advances in Information Security)

Encryption for Digital Content is an area in cryptography that is widely used in commercial productions (e.g., Blu-Ray and HD-DVDs). This book provides a comprehensive mathematical treatment of combinatorial encryption techniques used in digital content distribution systems and related attack models. A complete description of...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy