Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java 9 Recipes: A Problem-Solution Approach
Java 9 Recipes: A Problem-Solution Approach

Quickly find solutions to dozens of common programming problems encountered while building Java applications. Content is presented in the popular problem-solution format. Look up the programming problem that you want to resolve. Read the solution. Apply the solution directly in your own code. Problem solved!

This...

Mastering Windows Server 2016 Hyper-V
Mastering Windows Server 2016 Hyper-V

Build a seamless, flexible, full-service datacenter solution

Microsoft Windows Server 2016 Hyper-V is the IT administrator's guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness...

Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka
Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka

Learn how to integrate full-stack open source big data architecture and to choose the correct technology―Scala/Spark, Mesos, Akka, Cassandra, and Kafka―in every layer. 

Big data architecture is becoming a requirement for many different enterprises. So far, however, the focus has largely been on collecting,...

Java 8 Recipes
Java 8 Recipes

Java 8 Recipes offers solutions to common programming problems encountered while developing Java-based applications. Fully updated with the newest features and techniques available, Java 8 Recipes provides code examples involving Lambdas, embedded scripting with Nashorn, the new date-time API, stream support, functional...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Mastering Wireless Penetration Testing for Highly-Secured Environments
Mastering Wireless Penetration Testing for Highly-Secured Environments

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This Book

  • Conduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systems
  • Crack WEP, WPA, and even WPA2 wireless...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting, Searching (3rd Edition) (Pts. 1-4)
Algorithms in C++, Parts 1-4: Fundamentals, Data Structure, Sorting, Searching (3rd Edition) (Pts. 1-4)

Robert Sedgewick has thoroughly rewritten and substantially expanded and updated his popular work to provide current and comprehensive coverage of important algorithms and data structures. Christopher Van Wyk and Sedgewick have developed new C++ implementations that both express the methods in a concise and direct manner, and...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Result Page: 39 38 37 36 35 34 33 32 31 30 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy