Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Network Scanning Cookbook - Second Edition
Kali Linux Network Scanning Cookbook - Second Edition

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated...
Absolute Beginner's Guide to Microsoft Office 2003
Absolute Beginner's Guide to Microsoft Office 2003

Absolute Beginner's Guide to Microsoft Office 2003 covers Office 2003 for new users. The topics are organized in sections by application and cover the common Office tasks that the majority of readers want to accomplish. By focusing on key tasks in a concise way, the book packs enough information to bring readers up to speed quickly with...

A+ Complete Lab Manual, Third Edition
A+ Complete Lab Manual, Third Edition

This new edition of the A+ Complete Lab Manual has been thoroughly updated to cover the latest CompTIA objectives. It’s also been revised for easier navigation and a tighter fit with David Groth’s best-selling A+ Complete Study Guide. Use these resources together to gain the knowledge, skills, and confidence you...

Windows 2000 Commands Pocket Reference
Windows 2000 Commands Pocket Reference
This desktop reference documents Windows 2000 command mode. It is designed for system administrators, but will also prove beneficial to many other types of users. It includes most available Windows 2000 commands, as well as the most useful system administration command-line utilities from the Resource Kit (space permitting). Resource Kit commands...
DHCP for Windows 2000
DHCP for Windows 2000
Dynamic Host Configuration Protocol (DHCP) provides a means of allocating and managing IP addresses dynamically over a network. Before the advent of DHCP, administrators configured each host on a network with an IP address, subnet mask, and default gateway. Maintaining the changes and the logs of the changes took a tremendous amount of time and was...
Mastering Red Hat Linux 7
Mastering Red Hat Linux 7
Join the Red Hat Revolution!
Newly revised and updated, Mastering Red Hat Linux is the essential guide to the world's leading Linux distribution. Inside, you'll find everything you need to know to install, configure, use, and optimize Red Hat Linux. You'll even find the operating system itself-the Publisher's Edition of Red Hat Linux 7.1,
...
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design
Rapid Contextual Design: A How-to Guide to Key Techniques for User-Centered Design
Here are those little gems of advice that a skilled mentor who peered over your shoulder would tell you. If you lack such a mentor, this book is the next best thing, explaining just what you need to do in a straightforward, easy-to-read, easy-to-understand manner.

--Don Norman, Nielsen Norman group, Prof., Northwestern
...
Access to Knowledge in the Age of Intellectual Property
Access to Knowledge in the Age of Intellectual Property

At the end of the twentieth century, intellectual property rights collided with everyday life. Expansive copyright laws and digital rights management technologies sought to shut down new forms of copying and remixing made possible by the Internet. International laws expanding patent rights threatened the lives of millions of people around the...

Patterns in Network Architecture: A Return to Fundamentals
Patterns in Network Architecture: A Return to Fundamentals
Groundbreaking Patterns for Building Simpler, More Powerful Networks

 

In Patterns in Network Architecture, pioneer John Day takes a unique approach to solving the problem of network architecture. Piercing the fog of history, he bridges the gap between our experience from the...

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Creating Mobile Apps with Appcelerator Titanium
Creating Mobile Apps with Appcelerator Titanium

Develop fully-featured mobile applications using a hands-on approach, and get inspired to develop more

Overview

  • Walk through the development of ten different mobile applications by leveraging your existing knowledge of JavaScript
  • Allows anyone familiar with some Object-oriented Programming...
The BIOS Companion: The book that doesn't come with your motherboard!
The BIOS Companion: The book that doesn't come with your motherboard!
The instructions that turn a PC into a useful machine come in three stages, starting with application programs, which are loaded by an operating system, which in turn is loaded by a bootstrap loader in the BIOS (the Basic Input/Output System). There are several in a PC, a good example being the one on the video card that controls the interface...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy