Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers
Business Model Generation: A Handbook for Visionaries, Game Changers, and Challengers

Business Model Generation is a handbook for visionaries, game changers, and challengers striving to defy outmoded business models and design tomorrow's enterprises. If your organization needs to adapt to harsh new realities, but you don't yet have a strategy that will get you out in front of your competitors, you need...

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Kali Linux Cookbook
Kali Linux Cookbook

When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.

Overview

  • Recipes designed to educate you extensively on the penetration testing principles and Kali...
Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali: Practical Penetration Testing Techniques

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live...

Quantum Computing and Communications: An Engineering Approach
Quantum Computing and Communications: An Engineering Approach
Quantum computers will revolutionize the way telecommunications networks function.

Quantum computing holds the promise of solving problems that would be intractable with conventional computers, by implementing principles from quantum physics in the development of computer hardware, software and communications equipment....

3D Computer Vision: Efficient Methods and Applications (X.media.publishing)
3D Computer Vision: Efficient Methods and Applications (X.media.publishing)

This book provides an introduction to the foundations of three-dimensional computer vision and describes recent contributions to the field. Geometric methods include linear and bundle adjustment based approaches to scene reconstruction and camera calibration, stereo vision, point cloud segmentation, and pose estimation of rigid, articulated, and...

HDInsight Essentials
HDInsight Essentials

Tap your unstructured Big Data and empower your business using the Hadoop distribution from Windows

Overview

  • Architect a Hadoop solution with a modular design for data collection, distributed processing, analysis, and reporting
  • Build a multi-node Hadoop cluster on Windows servers
  • ...
Fourier Transform Methods in Finance
Fourier Transform Methods in Finance

In recent years, Fourier transform methods have emerged as one of the major methodologies for the evaluation of derivative contracts, largely due to the need to strike a balance between the extension of existing pricing models beyond the traditional Black-Scholes setting and a need to evaluate prices consistently with the market...

The Success of Open Source
The Success of Open Source

Much of the innovative programming that powers the Internet, creates operating systems, and produces software is the result of "open source" code, that is, code that is freely distributed--as opposed to being kept secret--by those who write it. Leaving source code open has generated some of the most sophisticated developments in...

Services Computing
Services Computing
As the core technical foundation for the modern services science, Services Computing covers the science, technology and business models of effectively creating and leveraging computing technology to bridge the gap between business and IT services. This book systematically introduces the fundamentals of this new discipline based on the latest...
Result Page: 67 66 65 64 63 62 61 60 59 58 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy