Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Mastering Windows Network Forensics and Investigation
Mastering Windows Network Forensics and Investigation

Conduct Cutting-Edge Forensic Investigations of Computer Crimes.

Whether it's phishing, bank fraud, or unlawful hacking, computer crimes are on the rise, and law enforcement personnel who investigate these crimes must learn how to properly gather forensic evidence in the computer age.

Now you can get the training you need in this...

Computational Framework for Knowledge: Integrated Behavior of Machines
Computational Framework for Knowledge: Integrated Behavior of Machines
"Intriguing . . . [filled with] new ideas about overarching intellectual themes that govern our technologies and our society."
Nikil Jayant, Eminent Scholar, Georgia Research Alliance

"Dr. Ahamed is correct in observing that 'silicon and glass have altered the rhythm of mind' and that...

Algorithms and Complexity. Handbook of Theoretical Computer Science, Vol. A
Algorithms and Complexity. Handbook of Theoretical Computer Science, Vol. A
Modern developments in computer and software systems have raised many challeng ing issues concerning the design and efficiency of complex programming applica tions. There is an increasing need for "advanced theory", to understand and exploit basic concepts and mechanisms in computing and information processing. The...
Introducing Java EE 7: A Look at What's New
Introducing Java EE 7: A Look at What's New

Introducing Java EE 7:  A Look at What’s New guides you through the new features and enhancements in each of the technologies comprising the Java EE platform.  Readers of this book will not have to wade through introductory material or information covering features that have been part of the EE platform for...

Learning FreeNAS: Configure and manage a network attached storage solution
Learning FreeNAS: Configure and manage a network attached storage solution

FreeNAS is a free piece of software that turns a PC into Network Attached Storage (NAS). It supports connections from Microsoft Windows, Apple OS X, Linux, and FreeBSD. It supports RAID, has a simple web GUI, and modest system requirements. Since FreeNAS is an embedded operating system, it is compact, efficient, and dedicated to just one...

IBM Cognos Business Intelligence 10.1 Dashboarding Cookbook
IBM Cognos Business Intelligence 10.1 Dashboarding Cookbook
This book covers, in detail, the various aspects of dashboard creation and use, in IBM Cognos 10 BI.

It includes detailed information and documentation about the tools available in IBM Cognos 10 BI to show users how to create dashboards and distribute them within an organization.

Step-by-step practical
...
Halo 2 Hacks: Tips & Tools for Finishing the Fight
Halo 2 Hacks: Tips & Tools for Finishing the Fight

Even if you've finished Halo 2 in Legendary Mode, you're not done with this game. Not by a long shot. You know there's a lot more you can squeeze out of Halo 2, and with the clever hacks we have in store, you'll turn the game into a whole new experience. Halo 2 Hacks is the creation of...

Innovative Applications in Data Mining (Studies in Computational Intelligence)
Innovative Applications in Data Mining (Studies in Computational Intelligence)
Data mining consists of attempting to discover novel and useful knowledge from data, trying to find patterns among datasets that can help in intelligent decision making. However, reports of real-world case studies are not generally detailed in the literature, due to the fact that they are usually based on proprietary datasets, making it impossible...
Advanced BlackBerry Development
Advanced BlackBerry Development

BlackBerry devices and applications are selling by the millions. As a BlackBerry developer, you need an advanced skill set to successfully exploit the most compelling features of the platform. This book will help you develop that skill set and teach you how to create the most sophisticated BlackBerry programs possible.

With Advanced...

Security on Rails
Security on Rails

The advantage of using Rails is its agility; it makes developing your web applications easy and fast. The disadvantage is that it can leave holes in your security if you are not aware of common vulnerabilities. It's a nerve-wracking and unfortunate fact that there are plenty of malicious people lurking on the Web. As a Rails developer, it...

Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy