Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Coder's Path to Wealth and Independence
The Coder's Path to Wealth and Independence

Developers, programmers, technical architects, and consultants: You are highly skilled and have deep commitment to your craft as well as the motivation to excel. It’s time to step away from the perceived security of a full-time salaried position, or a marginally successful solo business, and step into a world of freedom, independence,...

Theory of the Earth
Theory of the Earth
We need a new philosophy of the earth. Geological time used to refer to slow and gradual processes, but today we are watching land sink into the sea and forests transform into deserts. We can even see the creation of new geological strata made of plastic, chicken bones, and other waste that could remain in the fossil record for millennia or...
Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Career Command Through Filipino Martial Arts
Career Command Through Filipino Martial Arts
Are you ready to advance your career like a warrior? Are you ready to get a promotion and a raise without sacrificing your integrity? Are you ready to fall back in love with your job? Dr. Bryan Stoops is an educator and professional martial artist. Bryan has over fifteen years of experience in K12, both as a teacher and administrator in places...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Fair Management: How to Stop Ruling and Start Leading
Fair Management: How to Stop Ruling and Start Leading
Contemporary personnel management is faced with a number of challenges as work becomes increasingly digital and more flexible in terms of time. 'New Work', 'agile management' and a genuine culture of dealing with errors have revolutionised personnel management. What becomes especially apparent in this respect is that managers can...
Maximum Wireless Security
Maximum Wireless Security

Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to break into wireless networks, and that details the steps network administrators need to take to secure their systems.

The authors provide information to satisfy the expert's hunger for in-depth information with actual source code,...

Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Ethical Hacking and Countermeasures: Secure Network Infrastructures (Ethical Hacking and Countermeasures: C/ E H: Certified Ethical Hacker)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy