Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Hack Attacks Testing: How to Conduct Your Own Security Audit
Hack Attacks Testing: How to Conduct Your Own Security Audit
Learn how to conduct thorough security examinations via illustrations and virtual simulations

A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the...

Maximum Mac OS X Security
Maximum Mac OS X Security

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.

Yet most Mac OS X books are generally...

IBM Cognos 8 Report Studio Cookbook
IBM Cognos 8 Report Studio Cookbook

Cognos Report Studio is widely used for creating and managing business reports in medium to large companies. It is simple enough for any business analyst, power user, or developer to pick up and start developing basic reports. However, when it comes to developing more sophisticated, fully functional business reports for wider audiences,...

Fatigue of Structures and Materials
Fatigue of Structures and Materials
Fatigue of structures and materials covers a wide scope of different topics. The purpose of the present book is to explain these topics, to indicate how they can be analyzed, and how this can contribute to the designing of fatigue resistant structures and to prevent structural fatigue problems in service.

This book is...

Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)
Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)

Welcome to Introducing Autodesk Maya 2012 and the world of computer-generated imagery (CGI). Whether you’re new to 3D graphics or venturing into Autodesk’s powerhouse animation software from another 3D application, you’ll find this book a perfect primer. It introduces you to Maya and shows how you can work with Maya to...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

The Encyclopedia of Animated Cartoons
The Encyclopedia of Animated Cartoons
In the beginning (this was the 1960s for me), Saturday mornings existed for the sole purpose of watching cartoons. Before my brother and I were allowed to turn on the TV the only rule was that our beds had to be made, our breakfast eaten (Quisp! cereal) and our teeth brushed. Of course, we were up at the crack of dawn so as to not miss a thing....
Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Hacking: The Art of Exploitation
Hacking: The Art of Exploitation
This text introduces the spirit and theory of hacking as well as the science behind it all; it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks.

Hacking is the art of creating problem solving, whether used to find an unconventional solution to...

Manual of Neurologic Therapeutics Seventh Edition
Manual of Neurologic Therapeutics Seventh Edition
Once the last bastion of therapeutic nihilism, neurology has now clearly entered the era of intense therapy for virtually every class of disease that affects the nervous system. Consequently, the modern neurology department is now subdivided into a dozen clinical subspecialties, each with its own group of experts, often...
Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy