|
|
|
|
|
| | Applied Security VisualizationAPPLIED SECURITY VISUALIZATION
“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a... | | Mafiaboy: How I Cracked the Internet and Why It's Still Broken
I think it's fair to say that personal computers have become the most empowering tool we've ever created. They're tools of communication, they're tools of creativity, and they can be shaped by their user.
"HOT ON THE TRAIL OF 'MAFIABOY" read a headline on technology news site Wired.com on February 15,... |
|
Social Network Analysis for Startups: Finding connections on the social web
Does your startup rely on social network analysis? This concise guide provides a statistical framework to help you identify social processes hidden among the tons of data now available.
Social network analysis (SNA) is a discipline that predates Facebook and Twitter by 30 years. Through expert SNA researchers, you'll... | | Kali Linux Cookbook
When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Overview
-
Recipes designed to educate you extensively on the penetration testing principles and Kali...
| | |
|
|
|
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 |