Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Click!: The No Nonsense Guide to Digital Cameras
Click!: The No Nonsense Guide to Digital Cameras
Because Technology Should Improve Your Life, Not Complicate It

No Nonsense Guides are here. With a plainspoken approach, these books are inexpensive starters that are light on idle chat and heavy on practical advice. They're lean and mean and stripped down to fighting weight, so you'll get from point A to point Z with instruction...

The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda: Hacking the Presidency
"Hack-Along" with the Heroes and Villains of the Mezonic Agenda as the American Presidency hangs in the balance of cyber-space... In six days Hugh Davis will testify before Congress on the security, stability, and safety of Advice Software Inc.'s e-vote software. He is a world-renowned expert on software security, and his testimony will...
Quantum Computing Explained
Quantum Computing Explained
“In the twenty-first” century it is reasonable to expect that some of the most important developments in science and engineering will come about through interdisciplinary research. Already in the making is surely one of the most interesting and exciting development we are sure to see for a long time, quantum computation.

A
...
Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman
...

For Your Body Only: Discover the Diet You Were Born to Eat
For Your Body Only: Discover the Diet You Were Born to Eat

Cracking the code to the perfect personalized diet—and a lifetime of super-health Have you ever wondered why a new diet is invented almost every other day, yet obesity levels and disease in this country remain at an all-time high? Have you wondered why the diet that works so well for your friend has no impact on you—or even makes...

Access 2003 VBA Programmer's Reference (Programmer to Programmer)
Access 2003 VBA Programmer's Reference (Programmer to Programmer)
Its power and short learning curve have made Access Microsoft’s leading consumer relational database management system for desktop applications. VBA lets you tap more of that power, responding to application level events, displaying forms and reports, manipulating toolbars, and much more.

In this book, a crack team of programmers...

Kali Linux Wireless Penetration Testing Essentials
Kali Linux Wireless Penetration Testing Essentials

Plan and execute penetration tests on wireless networks with the Kali Linux distribution

About This Book

  • Learn the fundamentals of wireless LAN security and penetration testing
  • Discover and attack wireless networks using specialized Kali Linux tools
  • A step-by-step,...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)

Computer vision seeks a process that starts with a noisy, ambiguous signal from a TV camera and ends with a high-level description of discrete objects located in 3-dimensional space and identified in a human classification. In this book we address this process at several levels. We first treat the low-level image-processing issues of...

Creating a Data-Driven Organization
Creating a Data-Driven Organization

What do you need to become a data-driven organization? Far more than having big data or a crack team of unicorn data scientists, it requires establishing an effective, deeply-ingrained data culture. This practical book shows you how true data-drivenness involves processes that require genuine buy-in across your company, from analysts...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy