Home | Amazing | Today | Tags | Publishers | Years | Search 
Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
BackTrack 5 Cookbook
BackTrack 5 Cookbook

Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5

  • Learn to perform penetration tests with BackTrack 5
  • Nearly 100 recipes designed to teach penetration testing principles and build knowledge of BackTrack 5 Tools
  • Provides detailed...
Manual of Neurologic Therapeutics Seventh Edition
Manual of Neurologic Therapeutics Seventh Edition
Once the last bastion of therapeutic nihilism, neurology has now clearly entered the era of intense therapy for virtually every class of disease that affects the nervous system. Consequently, the modern neurology department is now subdivided into a dozen clinical subspecialties, each with its own group of experts, often...
Information Security For The Little Guy
Information Security For The Little Guy
Being secure in an insecure world is a tough nut to crack. There are so many ways that our personal information can be stolen and duplicated today it is a very serious situation and should be taken very seriously.

From our surfing the Internet to just the simplicity of speaking on a cell phone to our friends can
...
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)
Filtering, Segmentation and Depth (Lecture Notes in Computer Science)

Computer vision seeks a process that starts with a noisy, ambiguous signal from a TV camera and ends with a high-level description of discrete objects located in 3-dimensional space and identified in a human classification. In this book we address this process at several levels. We first treat the low-level image-processing issues of...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)
Introducing Autodesk Maya 2012 (Autodesk Official Training Guides)

Welcome to Introducing Autodesk Maya 2012 and the world of computer-generated imagery (CGI). Whether you’re new to 3D graphics or venturing into Autodesk’s powerhouse animation software from another 3D application, you’ll find this book a perfect primer. It introduces you to Maya and shows how you can work with Maya to...

WordPress 3 Ultimate Security
WordPress 3 Ultimate Security

Most likely, today, some hacker tried to crack your WordPress site, its data and content. Maybe that was just a one-off from some bored kid. Just as likely, it was an automated hit, trying dozens of attacks to find a soft spot. Then again, quite likely it was both.

Whether you've been successfully hacked already, else...

MAKE: Electronics: Learning Through Discovery
MAKE: Electronics: Learning Through Discovery
Want to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the...
Curious Folks Ask: 162 Real Answers on Amazing Inventions, Fascinating Products, and Medical Mysteries
Curious Folks Ask: 162 Real Answers on Amazing Inventions, Fascinating Products, and Medical Mysteries

“Dr. Seethaler has written an excellent book for any interested student of science. She answers great questions about the world around us in this fascinating book. As a high school science teacher, I encounter many of these from my own students. I would highly recommend this book for anyone who has pondered...

CSS Detective Guide: Tricks for solving tough CSS mysteries, The
CSS Detective Guide: Tricks for solving tough CSS mysteries, The

One of the toughest challenges novice CSS developers face is when seemingly perfect code doesn’t translate into a perfectly rendered browser page—and with all the different browsers available today, this happens all too often. The CSS Detective Guide aims to help, by teaching real world troubleshooting skills. You’ll...

Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy