 |
|
 CentOS 6 Linux Server Cookbook
An all-in-one guide to installing, configuring, and running a Centos 6 server. Ideal for newbies and old-hands alike, this practical tutorial ensures you get the best from this popular, enterprise-class free server solution.
-
Delivering comprehensive insight into CentOS server with a series of starting points that show you...
|  |  Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in... |  |  Kali Linux CTF Blueprints
Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux
About This Book
-
Put the skills of the experts to the test with these tough and customisable pentesting projects
-
Develop each challenge to suit your specific...
|
|
 Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... |  |  Ransomware: Defending Against Digital Extortion
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the... |  |  iOS Penetration Testing: A Definitive Guide to iOS Security
Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure.
When it comes to security, iOS has been in the spotlight for a variety of reasons. Although a tough system to ... |
|
 CEH v9: Certified Ethical Hacker Version 9 Study Guide
The ultimate preparation guide for the unique CEH exam.
The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,... |  |  Digital Privacy and Security Using Windows: A Practical Guide
Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.
This book teaches you how to secure your online identity and personal... |  |  Hue 1968: A Turning Point of the American War in Vietnam
“An extraordinary feat of journalism . . . full of emotion and color.”âKarl Marlantes, Wall Street Journal
The first battle book from Mark Bowden since his #1 New York Times bestseller Black Hawk Down, Hue 1968 is the story of the centerpiece of the Tet Offensive and a turning... |
|
|
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 |