Home | Amazing | Today | Tags | Publishers | Years | Search 
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Cisco ASA Configuration (Networking Professional's Library)
Cisco ASA Configuration (Networking Professional's Library)
Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of...
Oracle 11g For Dummies (Computer/Tech)
Oracle 11g For Dummies (Computer/Tech)
Are you a seasoned system administrator charged with setting up an Oracle database? Or did you suddenly become a DBA by default? If database administration with Oracle is part of your job, you’ll be glad to have Oracle 11g For Dummies in your cubicle.

This nuts-and-bolts guide walks you through the mysteries of Oracle and...

Schrodinger's Rabbits: The Many Worlds of Quantum
Schrodinger's Rabbits: The Many Worlds of Quantum
"Usually quantum fuzziness appears only in ultratiny arenas, on a scale smaller than a golf ball to the degree that the golf ball is smaller than Texas. But nowadays, in labs around the world, scientists are plotting to release quantum weirdness from its subatomic prison. Before too long, quantum news won't be just for the science section...
RF Components and Circuits
RF Components and Circuits
*A complete course in understanding and designing RF circuits
*Practical design knowhow from a world-class author

A comprehensive introduction to designing and understanding RF circuits

RF Components and Circuits covers the practicalities of designing and building circuits, including fault-finding and use of test
...
Architecting Software Intensive Systems: A Practitioners Guide
Architecting Software Intensive Systems: A Practitioners Guide
Today our civilization is highly dependent upon software-intensive systems. Software-intensive systems are those systems that are highly dependent upon computing infrastructure and software for the basic functionality they provide and the properties they possess. Architecture design of software-intensive systems as a separate and distinct...
Fuzzy Logic with Engineering Applications
Fuzzy Logic with Engineering Applications

Fuzzy logic is a simple phrase that actually refers to a large subject dealing with a set of methods to characterize and quantify uncertainty in engineering systems that arise from ambiguity, imprecision, fuzziness, and lack of knowledge.

This 15-chapter textbook remains the only major text that can be used for both undergraduate...

Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)
Social Computing in Homeland Security: Disaster Promulgation and Response (Premier Reference Source)
The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face.

Social Computing in Homeland Security: Disaster Promulgation and Response presents a theoretical framework addressing how to...

Mastering Microsoft Exchange Server 2007 SP1
Mastering Microsoft Exchange Server 2007 SP1
Microsoft Exchange Server provides a reliable messaging system that protects against spam and viruses and allows for access to e-mail, voicemail, and calendars from a variety devices and any location. Fully updated for the latest release of Microsoft Exchange Server 2007 Service Pack 1 (SP1), this book offers a look at the significant improvements...
Seeing the Elephant: Understanding Globalization from Trunk to Tail
Seeing the Elephant: Understanding Globalization from Trunk to Tail

In the new millennium, it is nearly impossible for us to talk about basic concerns like food or gas prices, without examining global intersections in trade, energy, immigration, the environment, and defense. Many countries once described as "developing" nations now wield greater economic and political influence than some of the...

Security for Telecommunications Networks (Advances in Information Security)
Security for Telecommunications Networks (Advances in Information Security)
Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them. Given the significant focus on securing critical infrastructure in recent years,...
The World Heroin Market: Can Supply Be Cut? (Studies in Crime and Public Policy)
The World Heroin Market: Can Supply Be Cut? (Studies in Crime and Public Policy)
Heroin is universally considered the world's most harmful illegal drug. This is due not only to the damaging effects of the drug itself, but also to the spread of AIDS tied to its use. Burgeoning illegal mass consumption in the 1960s and 1970s has given rise to a global market for heroin and other opiates of nearly 16 million users. The production...
Result Page: 36 35 34 33 32 31 30 29 28 27 26 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy