Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Machine Learning with R - Second Edition
Machine Learning with R - Second Edition

Key Features

  • Harness the power of R for statistical computing and data science
  • Explore, forecast, and classify data with R
  • Use R to apply common machine learning algorithms to real-world scenarios

Book Description

Machine learning, at its core, is concerned...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
From Java to Ruby: Things Every Manager Should Know
From Java to Ruby: Things Every Manager Should Know
As I drove across the central Texas landscape, my excitement and anxiety were both building. I was driving to a new client that would change everything for me. This short trip would take me an hour south to a small college town, but symbolically I was beginning a much longer journey. I was going from Java to Ruby.

The past year, I had
...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Analysis and Design of Information Systems
Analysis and Design of Information Systems
In any software design project, the analysis stage - documenting and designing technical requirements for the needs of users - is vital to the success of the project.

This third edition of the successful Analysis and Design of Information Systems provides a comprehensive introduction and user-friendly survey to all aspects of business...

Data versus Democracy: How Big Data Algorithms Shape Opinions and Alter the Course of History
Data versus Democracy: How Big Data Algorithms Shape Opinions and Alter the Course of History
Human attention is in the highest demand it has ever been. The drastic increase in available information has compelled individuals to find a way to sift through the media that is literally at their fingertips. Content recommendation systems have emerged as the technological solution to this...
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Building the Realtime User Experience: Creating Immersive and Interactive Websites
Building the Realtime User Experience: Creating Immersive and Interactive Websites

The Web is increasingly happening in realtime. With websites such as Facebook and Twitter leading the way, users are coming to expect that all sites should serve content as it occurs -- on smartphones as well as computers. This book shows you how to build realtime user experiences by adding chat, streaming content, and including more...

Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Android 6 Essentials
Android 6 Essentials

Design, build, and create your own applications using the full range of features available in Android 6

About This Book

  • Learn how to utilize the robust features of Android 6 to design, develop, and publish better Android applications
  • Get useful guidance on creating new apps or migrating...
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)
Iran and Nuclear Weapons: Protracted Conflict and Proliferation (Routledge Global Security Studies)

This book investigates what is driving Iran's nuclear weapons programme in a less-hostile regional environment, using a theory of protracted conflicts to explicate proliferation.

Iran’s nuclear weapons program has alarmed the international community since the 1990s, but has come to the forefront of international security...

Result Page: 12 11 10 9 8 7 6 5 4 3 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy