Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Quantum Computing Explained
Quantum Computing Explained
“In the twenty-first” century it is reasonable to expect that some of the most important developments in science and engineering will come about through interdisciplinary research. Already in the making is surely one of the most interesting and exciting development we are sure to see for a long time, quantum computation.

A
...
Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman
...

For Your Body Only: Discover the Diet You Were Born to Eat
For Your Body Only: Discover the Diet You Were Born to Eat

Cracking the code to the perfect personalized diet—and a lifetime of super-health Have you ever wondered why a new diet is invented almost every other day, yet obesity levels and disease in this country remain at an all-time high? Have you wondered why the diet that works so well for your friend has no impact on you—or even makes...

Access 2003 VBA Programmer's Reference (Programmer to Programmer)
Access 2003 VBA Programmer's Reference (Programmer to Programmer)
Its power and short learning curve have made Access Microsoft’s leading consumer relational database management system for desktop applications. VBA lets you tap more of that power, responding to application level events, displaying forms and reports, manipulating toolbars, and much more.

In this book, a crack team of programmers...

Kali Linux Wireless Penetration Testing Essentials
Kali Linux Wireless Penetration Testing Essentials

Plan and execute penetration tests on wireless networks with the Kali Linux distribution

About This Book

  • Learn the fundamentals of wireless LAN security and penetration testing
  • Discover and attack wireless networks using specialized Kali Linux tools
  • A step-by-step,...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)

Computer vision seeks a process that starts with a noisy, ambiguous signal from a TV camera and ends with a high-level description of discrete objects located in 3-dimensional space and identified in a human classification. In this book we address this process at several levels. We first treat the low-level image-processing issues of...

Creating a Data-Driven Organization
Creating a Data-Driven Organization

What do you need to become a data-driven organization? Far more than having big data or a crack team of unicorn data scientists, it requires establishing an effective, deeply-ingrained data culture. This practical book shows you how true data-drivenness involves processes that require genuine buy-in across your company, from analysts...

Hiding in Plain Sight: Steganography and the Art of Covert Communication
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Your hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography

These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted...

The Angry Chef: Bad Science and the Truth About Healthy Eating
The Angry Chef: Bad Science and the Truth About Healthy Eating

"The popular understanding of nutrition is clouded by superstitions, primitive intuitions, conspiracy theories, and old wives' tales. This irreverent and intelligent expose brings sanity and good sense to one of life's great pleasures." ―Steven Pinker, author of Angels of Our Better Nature

...

Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy