Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Recruit and Hire Great Software Engineers: Building a Crack Development Team
How to Recruit and Hire Great Software Engineers: Building a Crack Development Team

Want a great software development team? Look no further. How to Recruit and Hire Great Software Engineers: Building a Crack Development Team is a field guide and instruction manual for finding and hiring excellent engineers that fit your team, drive your success, and provide you with a competitive advantage. Focusing on proven...

Click!: The No Nonsense Guide to Digital Cameras
Click!: The No Nonsense Guide to Digital Cameras
Because Technology Should Improve Your Life, Not Complicate It

No Nonsense Guides are here. With a plainspoken approach, these books are inexpensive starters that are light on idle chat and heavy on practical advice. They're lean and mean and stripped down to fighting weight, so you'll get from point A to point Z with instruction...

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Quantum Computing Explained
Quantum Computing Explained
“In the twenty-first” century it is reasonable to expect that some of the most important developments in science and engineering will come about through interdisciplinary research. Already in the making is surely one of the most interesting and exciting development we are sure to see for a long time, quantum computation.

A
...
Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman
...

For Your Body Only: Discover the Diet You Were Born to Eat
For Your Body Only: Discover the Diet You Were Born to Eat

Cracking the code to the perfect personalized diet—and a lifetime of super-health Have you ever wondered why a new diet is invented almost every other day, yet obesity levels and disease in this country remain at an all-time high? Have you wondered why the diet that works so well for your friend has no impact on you—or even makes...

Access 2003 VBA Programmer's Reference (Programmer to Programmer)
Access 2003 VBA Programmer's Reference (Programmer to Programmer)
Its power and short learning curve have made Access Microsoft’s leading consumer relational database management system for desktop applications. VBA lets you tap more of that power, responding to application level events, displaying forms and reports, manipulating toolbars, and much more.

In this book, a crack team of programmers...

Kali Linux Wireless Penetration Testing Essentials
Kali Linux Wireless Penetration Testing Essentials

Plan and execute penetration tests on wireless networks with the Kali Linux distribution

About This Book

  • Learn the fundamentals of wireless LAN security and penetration testing
  • Discover and attack wireless networks using specialized Kali Linux tools
  • A step-by-step,...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy