Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...
Learn advanced C# concepts and techniques such as building caches, cryptography, and parallel programming by solving interesting programming challenges
Key Features
Gain useful insights on advanced C# programming topics and APIs
This comprehensive, technical reference guide provides in-depth information on Apple technical architecture. It will teach the reader how to install and configure machines; architect and maintain networks; enable, customize, tune and troubleshoot a wide range of services; and integrate Mac OS X, Mac OS X Server, and other Apple technologies within...
Any program worth its salt uses operating system services. Even a simple program, if practical, reads input and produces output. And, most applications have more complex needs. They need to find out the time, use the network, or start and communicate with other processes. Systems programming really means nothing more than writing...
What time of year do teenage girls search for prom dresses online? How does the quick adoption of technology affect business success (and how is that related to corn farmers in Iowa)? How do time and money affect the gender of visitors to online dating sites? And how is the Internet itself affecting the way we experience the world? In...
This book guides readers through proven techniques for achieving and measuring success in search engine marketing (i.e. how to be the top of the rank), along with a review of the most important search engines and directories.
Explains why and how marketers can and must optimize...
The recommended entry point to start exploring the NIO.2 API, also known as “JSR 203: More New I/O
APIs for the Java Platform” (NIO.2), is the new abstract class java.nio.file.Path. This class is a
milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities
of this...