Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.

...
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
Green, Pervasive, and Cloud Computing: 13th International Conference, GPC 2018, Hangzhou, China, May 11-13, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11204))
This book constitutes the proceedings of the 13th International Conference on Green, Pervasive, and Cloud Computing, GPC 2018, held in Hangzhou, China, in May 2018.

The 35 full papers included in this volume were carefully reviewed and selected from 101 initial submissions. They are organized in the following
...
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity
Computer Programming for Beginners and Cybersecurity: The Ultimate Manual to Learn step by step how to Professionally Code and Protect Your Data. This Book includes: Python, Java, C++ & Cybersecurity

Are you looking for the right Guide to improve your technical skills in programming and cybersecurity?

Would you like to start your own business or look for a job with better knowledge in computer programming and data protection?

Would you like to be sure to have in your hands a manual...

Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)
Sams Teach Yourself TCP/IP in 24 Hours (4th Edition)
In just 24 lessons of one hour or less, you will uncover the inner workings of TCP/IP. Using a straightforward, step-by-step approach, each lesson builds on the previous ones, enabling you to learn the essentials of TCP/IP from the ground up.

 

Practical discussions provide...

The Discourse of Security: Language, Illiberalism and Governmentality (Postdisciplinary Studies in Discourse)
The Discourse of Security: Language, Illiberalism and Governmentality (Postdisciplinary Studies in Discourse)

This book explores how language constructs the meaning and praxis of security in the 21st century. Combining the latest critical theories in poststructuralist and political philosophy with discourse analysis techniques, it uses corpus tools to investigate four collections of documents harvested from national and...

Python Penetration Testing Essentials
Python Penetration Testing Essentials

Employ the power of Python to get the best out of pentesting

About This Book

  • Learn to detect and avoid various types of attacks that put the privacy of a system at risk
  • Employ practical approaches to penetration testing using Python to build efficient code and eventually save time
  • ...
Authentication and Access Control: Practical Cryptography Methods and Tools
Authentication and Access Control: Practical Cryptography Methods and Tools
The advent of the Internet has allowed for many services and applications, most notably in communications between users, servers, and devices. Unfortunately, this has led to many security challenges and problems. Recent examples include password leakage on large social network sites and defacement of websites. It is, therefore,...
Hacking Exposed: Network Security Secrets & Solutions, Third Edition
Hacking Exposed: Network Security Secrets & Solutions, Third Edition

"If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed, Third Edition." --Marty Roesch, creator of the Snort tool

"A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Third Edition delivers just that...and more."...

Brute Force: Cracking the Data Encryption Standard
Brute Force: Cracking the Data Encryption Standard
In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved...
Web Application Vulnerabilities: Detect, Exploit, Prevent
Web Application Vulnerabilities: Detect, Exploit, Prevent
This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect,...
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed...
MCAD/MCSD Self-Paced Training Kit: Implementing Security for Applications with Microsoft  Visual Basic  .NET and Microsoft Visual C#  .NET
MCAD/MCSD Self-Paced Training Kit: Implementing Security for Applications with Microsoft Visual Basic .NET and Microsoft Visual C# .NET
Welcome to MCAD/MCSD Self-Paced Training Kit: Implementing Security for Applications with Microsoft Visual Basic .NET and Microsoft Visual C# .NET.

Developers have learned an important lesson in the last few years: they cannot rely on networks and operating systems to protect applications from attack. Any application, including both Web
...
unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy