Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Dark Side of Leadership: An Institutional Perspective
The Dark Side of Leadership: An Institutional Perspective

Contrary to the notion that leaders contribute to positive behaviour within organisations, this book reflects growing interest in the ‘dark side’ of leadership: the unethical and immoral personalities that can reside in positions of power. Drawing on empirical and theoretical analysis, the author examines immorality...

Batman and Ethics
Batman and Ethics

Batman has been one of the world’s most beloved superheroes since his first appearance in Detective Comics #27 in 1939. Clad in his dark cowl and cape, he has captured the imagination of millions with his single-minded mission to create a better world for the people of Gotham City by fighting crime, making use of expert...

Applied Deep Learning with Python: Use scikit-learn, TensorFlow, and Keras to create intelligent systems and machine learning solutions
Applied Deep Learning with Python: Use scikit-learn, TensorFlow, and Keras to create intelligent systems and machine learning solutions

A hands-on guide to deep learning that's filled with intuitive explanations and engaging practical examples

Key Features

  • Designed to iteratively develop the skills of Python users who don't have a data science background
  • Covers the key foundational concepts...
The Wiley Handbook of Global Educational Reform (Wiley Handbooks in Education)
The Wiley Handbook of Global Educational Reform (Wiley Handbooks in Education)

The Wiley Handbook of Global Educational Reform examines educational reform from a global perspective. Comprised of approximately 25 original and specially commissioned essays, which together interrogate educational reform from a critical global and transnational perspective, this volume explores a range of topics and themes...

Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Master the tools and techniques of mobile forensic investigations

...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws
Hands-On Bug Hunting for Penetration Testers: A practical guide to help ethical hackers discover web application security flaws

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities.

Key Features

  • Learn how to test for common bugs
  • Discover tools and methods for hacking ethically
  • Practice working through pentesting engagements...
Understanding Ethics in Applied Behavior Analysis: Practical Applications
Understanding Ethics in Applied Behavior Analysis: Practical Applications

Drawing upon combined 35 years of clinical experience as well as the reflections of colleagues in the field, Understanding Ethics in Applied Behavior Analysis provides the foundation for a lifelong journey of ethical practice in service for individuals with autism spectrum disorder (ASD) and other developmental disabilities....

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Result Page: 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy