Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux
Web Penetration Testing with Kali Linux - Third Edition: Explore the methods and tools of ethical hacking with Kali Linux

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes

Key Features

  • Know how to set up your lab with Kali Linux
  • Discover the core concepts of web penetration testing
  • ...
How Professionals Make Decisions (Expertise: Research and Applications)
How Professionals Make Decisions (Expertise: Research and Applications)
The essays in this collection are the product of the 2000 Naturalistic Decision Making (NDM) Conference. They attempt to discover progress made in the field since the first volume was published in 1993. Individual paper address topics such as planning under time pressure, managing complex dynamic systems and making ethical decisions.
...
Lewis Fry Richardson: His Intellectual Legacy and Influence in the Social Sciences (Pioneers in Arts, Humanities, Science, Engineering, Practice)
Lewis Fry Richardson: His Intellectual Legacy and Influence in the Social Sciences (Pioneers in Arts, Humanities, Science, Engineering, Practice)
This is an open access book. Lewis F Richardson (1981-1953), a physicist by training, was a pioneer in meteorology and peace research and remains a towering presence in both fields. This edited volume reviews his work and assesses its influence in the social sciences, notably his work on arms races and their...
Women in Biotechnology: Creating Interfaces
Women in Biotechnology: Creating Interfaces
Biotechnologies, such as genetic engineering, cloning and biodiversity, raise many legal and ethical concerns, so it is important that people understand these issues and feel able to express their opinions. This is why the European Commission has been, for a number of years, supporting actions to improve communication among...
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online
Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical...
Learning Joomla! 3 Extension Development-Third Edition
Learning Joomla! 3 Extension Development-Third Edition

Joomla 3 is the first of the major open source content management systems that was meant to be mobile friendly by default. Joomla uses object-oriented principles, is database agnostic, and has the best mix of functionality, extensibility, and user friendliness. Add to that the fact that Joomla is completely community driven, and you have a...

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

Ethical Problems in Emergency Medicine: A Discussion-based Review
Ethical Problems in Emergency Medicine: A Discussion-based Review

This book is designed to consolidate the relevant literature as well as the thoughts of professionals currently working in the field into a practical and accessible reference for the emergency medical technician, student, nurse, resident, and attending emergency physician. Each chapter is divided into four sections: case presentation,...

Justice in Oral Health Care: Ethical & Educational Perspectives (Marquette Studies in Philosophy)
Justice in Oral Health Care: Ethical & Educational Perspectives (Marquette Studies in Philosophy)

Oral health is an intrinsic part of overall health. The mouth is part of the digestive and respiratory systems; it is essential to spoken communication and facial expression; in fact, toothaches are among the most severe and hence debilitating kinds of pain that a person can suffer. The economic cost of dental disease is staggering, equaling...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Above the Board: How Ethical CEOs Create Honest Corporations
Above the Board: How Ethical CEOs Create Honest Corporations
In recent years, a string of corporate scandals have sent shockwaves throughout the business world, resulting in the fracture of public trust in corporations. Now more than ever, corporate honesty and integrity are directly connected to success and growth. Above the Board provides strategies and methods to help you build a solid foundation...
Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy