Home | Amazing | Today | Tags | Publishers | Years | Search 
Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
ESD Basics: From Semiconductor Manufacturing to Product Use
ESD Basics: From Semiconductor Manufacturing to Product Use

Electrostatic discharge (ESD) continues to impact semiconductor manufacturing, semiconductor components and systems, as technologies scale from micro- to nano electronics. This book introduces the fundamentals of ESD, electrical overstress (EOS), electromagnetic interference (EMI), electromagnetic compatibility (EMC), and latchup, as well as...

Handbook of Smoke Control Engineering
Handbook of Smoke Control Engineering

The Handbook of Smoke Control Engineering extends the tradition of the comprehensive treatment of smoke control technology, including fundamental concepts, smoke control systems, and methods of analysis. The handbook provides information needed for the analysis of design fires, including considerations of sprinklers, shielded fires, and...

Financial Accounting (8th Edition)
Financial Accounting (8th Edition)

Financial Accounting helps students “nail” the accounting cycle up front in order to increase success and retention later on. The concepts and mechanics students learn in the critical ‘accounting cycle’ chapters are used consistently and repetitively—and with clear-cut details and...

Wiley CPAexcel Exam Review 2015 Focus Notes: Auditing and Attestation
Wiley CPAexcel Exam Review 2015 Focus Notes: Auditing and Attestation

All the information you need to pass the CPA exam on your own

Updated annually with the latest AICPA content guidelines, Wiley CPAexcel Exam Review 2015 Focus Notes provides a review of all the basic skills and concepts tested on the CPA exam and teaches important strategies to take the exam faster and more...

Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats
Mastering Linux Security and Hardening: Secure your Linux server and protect it from intruders, malware attacks, and other external threats

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.

Key Features

  • Leverage this guide to confidently deliver a system that reduces the risk of being hacked
  • Perform a number of advanced Linux security techniques such as...
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Teach Yourself Database Programming With Visual Basic 5 in 21 Days
Teach Yourself Database Programming With Visual Basic 5 in 21 Days
Welcome to Teach Yourself Database Programming with Visual Basic 5 in 21 Days, Second Edition. You cover a lot of ground in the next 21 lessons-from developing fully functional input screens with fewer than 10 lines of Visual Basic code and writing Visual Basic code libraries, to handling complex user security and auditing in...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)

The best fully integrated study system available for the CompTIA Security+ exam!

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

With hundreds of...

Securing SQL Server: DBAs Defending the Database
Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy for your database enterprise. This new edition covers threat analysis, common attacks and countermeasures, and provides an introduction to compliance that is useful for meeting regulatory requirements such as the GDPR. The...
Documenting Oracle Databases_ Complete Oracle Database Schema Auditing
Documenting Oracle Databases_ Complete Oracle Database Schema Auditing

Many times the Oracle DBA is hired once the database becomes to much to handle without one, inherits the position or is appointed to it “since they

are so good with computers”. In any case, they usually get an undocumented system that follows no conventions and holds many traps for the unwary DBA.

...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy