Home | Amazing | Today | Tags | Publishers | Years | Search 
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Programming the BeagleBone
Programming the BeagleBone

About This Book

  • Quickly develop electronics projects that interact with Internet applications using JavaScript and Python
  • Learn about electronics components such as sensors and motors, and how to communicate with them by writing programs
  • A step-by-step guide to explore the...
Magnetohydrodynamics of Laboratory and Astrophysical Plasmas
Magnetohydrodynamics of Laboratory and Astrophysical Plasmas
With ninety per cent of visible matter in the universe existing in the plasma state, an understanding of magnetohydrodynamics is essential for anyone looking to understand solar and astrophysical processes, from stars to accretion discs and galaxies; as well as laboratory applications focused on harnessing controlled fusion energy. This...
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Know how to set up, defend, and attack computer networks with this revised and expanded second edition.

You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...

The Power of Algorithms: Inspiration and Examples in Everyday Life
The Power of Algorithms: Inspiration and Examples in Everyday Life

To examine, analyze, and manipulate a problem to the point of designing an algorithm for solving it is an exercise of fundamental value in many fields. With so many everyday activities governed by algorithmic principles, the power, precision, reliability and speed of execution demanded by users have transformed the design and...

Soft Computing for Data Mining Applications (Studies in Computational Intelligence)
Soft Computing for Data Mining Applications (Studies in Computational Intelligence)
The authors have consolidated their research work in this volume titled Soft Computing for Data Mining Applications. The monograph gives an insight into the research in the ?elds of Data Mining in combination with Soft Computing methodologies. In these days, the data continues to grow - ponentially. Much of the data is implicitly or explicitly...
Bayesian Hierarchical Models: With Applications Using R, Second Edition
Bayesian Hierarchical Models: With Applications Using R, Second Edition

An intermediate-level treatment of Bayesian hierarchical models and their applications, this book demonstrates the advantages of a Bayesian approach to data sets involving inferences for collections of related units or variables, and in methods where parameters can be treated as random collections. Through illustrative data analysis...

Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics
Using and Administering Linux: Volume 2: Zero to SysAdmin: Advanced Topics

Experience an in-depth exploration of logical volume management and the use of file managers to manipulate files and directories and the critical concept that, in Linux, everything is a file and some fun and interesting uses of the fact that everything is a file.

This book builds upon the skills you learned in Volume 1...

Tsunami Generation and Propagation (Springer Geophysics)
Tsunami Generation and Propagation (Springer Geophysics)

This book introduces a framework of tsunami modelling from generation to propagation, aimed at application to the new observation started in Japan after the devastating tsunami of the 2011 Tohoku-Oki earthquake. About 150 seismic and tsunami sensors were deployed in a wide region off the Pacific coast of eastern Japan in order to...

Civil Resistance and Violent Conflict in Latin America: Mobilizing for Rights (Studies of the Americas)
Civil Resistance and Violent Conflict in Latin America: Mobilizing for Rights (Studies of the Americas)

This book explores distinct forms of civil resistance in situations of violent conflict in cases across Latin America, drawing important lessons learned for nonviolent struggles in the region and beyond. The authors analyse campaigns against armed actors in situations of internal armed conflict, against private sector companies that seek to...

Result Page: 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy