Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Check Point Next Generation Security Administration
Check Point Next Generation Security Administration
Check Point NG aims to teach its readers how to install and set up VPN-1/FireWall-1 Next Generation, the latest version of the highly respected firewall software from Check Point. Its authors--all with significant network and security certifications--accomplish their objective: it seems likely that this book will travel with a lot of Check...
How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Django RESTful Web Services: The easiest way to build Python RESTful APIs and web services with Django
Django RESTful Web Services: The easiest way to build Python RESTful APIs and web services with Django

Design, build and test RESTful web services with the Django framework and Python

Key Features

  • Create efficient real-world RESTful web services with the latest Django framework
  • Authenticate, secure, and integrate third-party packages efficiently in your Web Services
  • ...
Hacking Windows XP (ExtremeTech)
Hacking Windows XP (ExtremeTech)
Check out the view from Steve Sinchak's Windows

Sure, Windows XP is already superior to its predecessors. But what if you could make it even better? Well, stop reading the cover and buy this book, because that’s exactly what it teaches you. This is the serious stuff–step-by-step hacks that beef up speed and security, customize...

Managing the Risks of Payments Systems
Managing the Risks of Payments Systems
Identify and manage payment risk

The risks of payment systems have dramatically evolved…new laws, new technologies, new threats combined with the chronic problems of error, fraud, and security. Treasury and banking executives and their counsel ignore these risks at their peril. "We didn’t know" is no excuse.

...
Learning Nessus for Penetration Testing
Learning Nessus for Penetration Testing

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment

Overview

  • Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing
  • ...
.NET Web Services Solutions
.NET Web Services Solutions

.NET Web Services Solutions offers just what its title states: practical solutions to the real challenges you face as you use .NET to create applications that communicate with web services and—more to the point—to build and deploy web services of your own. By the time you’re done, you’ll understand how the...

Check Your Vocabulary for English for the Ielts Examination: A Workbook for Students (Check Your Vocabulary Workbooks)
Check Your Vocabulary for English for the Ielts Examination: A Workbook for Students (Check Your Vocabulary Workbooks)
Nonnative speakers of English will find this instructional workbook a helpful source for improving and expanding their English language vocabulary in preparation for the IELTS examination (International English Language Test for Students). Over 60 activities are provided, including word games, puzzles, and quizzes that are specifically designed to...
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and...

Beginning Data Science in R: Data Analysis, Visualization, and Modelling for the Data Scientist
Beginning Data Science in R: Data Analysis, Visualization, and Modelling for the Data Scientist
Discover best practices for data analysis and software development in R and start on the path to becoming a fully-fledged data scientist. This book teaches you techniques for both data manipulation and visualization and shows you the best way for developing new software packages for R.

Beginning Data Science in R...
Coding for Wireless Channels (Information Technology: Transmission, Processing and Storage)
Coding for Wireless Channels (Information Technology: Transmission, Processing and Storage)
Coding for Wireless Channels is an accessible introduction to the theoretical foundations of modern coding theory, with applications to wireless transmission systems. State-of-the-art coding theory is explained using soft (maximum-likelihood) decoding rather than algebraic decoding. Convolutional codes, trellis-coded modulation,...
CCDA Exam Certification Guide ((CP) CERTIFICATION)
CCDA Exam Certification Guide ((CP) CERTIFICATION)
The official study guide for DCN exam #640-441Coverage of the CCDA exam design objectives enables you to discover your knowledge gaps before the exam date. You'll learn to:Characterize a customer's existing network and identify customer needsSimplify the complexities associated with analyzing customer network problems and creating Cisco scalable...
unlimited object storage image
Result Page: 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy