Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Antenna Theory and Design
Antenna Theory and Design
The first edition of Antenna Theory and Design was published in 1981 and the second in 1998. This three-decade span has seen major expansions of antenna application areas, mainly in wireless communications. Along with technology advances has come public awareness of the presence and importance of antennas. Base station antennas are...
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science
Apache Spark 2.x Cookbook: Cloud-ready recipes for analytics and data science

Key Features

  • This book contains recipes on how to use Apache Spark as a unified compute engine
  • Cover how to connect various source systems to Apache Spark
  • Covers various parts of machine learning including supervised/unsupervised learning & recommendation engines

Book...

Electrical Engineering: Principles and Applications (5th Edition)
Electrical Engineering: Principles and Applications (5th Edition)

For undergraduate introductory or survey courses in electrical engineering.

 

ELECTRICAL ENGINEERING: PRINCIPLES AND APPLICATIONS, 5/e helps students learn electrical-engineering fundamentals with minimal frustration. Its goals are to...

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

Electric Motors and Drives: Fundamentals, Types and Applications (3rd Edition)
Electric Motors and Drives: Fundamentals, Types and Applications (3rd Edition)
Like its predecessors, the third edition of this book is intended primarily for non-specialist users and students of electric motors and drives. My original aim was to bridge the gap between specialist textbooks (which are pitched at a level too academic for the average user) and the more prosaic ‘handbooks’, which...
Network Flow Analysis
Network Flow Analysis

You know that servers have log files and performance measuring tools and that traditional network devices have LEDs that blink when a port does something. You may have tools that tell you how busy an interface is, but mostly a network device is a black box. Network Flow Analysis opens that black box, demonstrating how to use...

The Underwater Photographer, Third Edition: Digital and Traditional Techniques
The Underwater Photographer, Third Edition: Digital and Traditional Techniques
A superb hand-on manual containing a wealth of underwater tips, hints and advice - all beautifully illustrated with brand new, full colour images.

Martin Edge, a leading authority on underwater photography, will help you capture stunning effects using his popular 'think and consider' system - offering a heightened awareness and
...
Contamination-Free Manufacturing for Semiconductors and Other Precision Products
Contamination-Free Manufacturing for Semiconductors and Other Precision Products
Provides advanced treatment and in-depth coverage of the origins, procedures, and disposal of contaminants in the manufacturing of semiconductors and other precision products. Offers solutions to inadequate areas of measurement capability and control technology, clarifying problems in the industry.

Semiconductor chip manufacturing, now a
...
Introduction to Biometrics
Introduction to Biometrics
A number of crucial societal applications like international border crossing, electronic commerce, and welfare disbursement require reliable person recognition systems. Traditional person authentication methods based on passwords and identity documents often fail to meet the stringent security and performance demands of these...
Result Page: 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy