Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network
Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical...

Mastering Parallel Programming with R
Mastering Parallel Programming with R

Master the robust features of R parallel programming to accelerate your data science computations

About This Book

  • Create R programs that exploit the computational capability of your cloud platforms and computers to the fullest
  • Become an expert in writing the most efficient and highest...
The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

Network Security Assessment: From Vulnerability to Patch
Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.

This is unique in that it details both the management and technical skill and tools
...
The Best Damn IT Security Management Book Period
The Best Damn IT Security Management Book Period
This chapter will address vulnerabilities and why they are important. It also discusses a concept known as Windows of Vulnerability, and shows how to determine the risk a given vulnerability poses to your environment.

What Are Vulnerabilities?

So, what are
...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

High Definition Postproduction: Editing and Delivering HD Video
High Definition Postproduction: Editing and Delivering HD Video
Avoid costly missteps in postproduction and get it right the first time with this book. Written by an in-the-trenches professional who works with HD every day, High Definition Postproduction is an overview of this exciting opportunity for film and video production and postproduction professionals. High Definition production and editing is here and...
Cryptanalysis of RSA and Its Variants
Cryptanalysis of RSA and Its Variants

Thirty years after RSA was first publicized, it remains an active research area. Although several good surveys exist, they are either slightly outdated or only focus on one type of attack. Offering an updated look at this field, Cryptanalysis of RSA and Its Variants presents the best known mathematical attacks on RSA and its...

Learn iOS 8 App Development
Learn iOS 8 App Development

Learn iOS 8 App Development is both a rapid tutorial and a useful reference. You'll quickly get up to speed with Swift (Apple's powerful new programming language), Cocoa Touch, and the iOS 8 SDK. It's an all-in-one getting started guide to building useful apps. You'll learn best practices that ensure your code will be...

Accelerated C# 2008
Accelerated C# 2008
C# 2008 offers powerful new features, and Accelerated C# 2008 is the fastest path to mastering them, and the rest of C#, for both experienced C# programmers moving to C# 2008 and programmers moving to C# from another object-oriented language. Many books introduce C#, but very few also explain how to use it optimally with the .NET common...
Model-Based Design for Embedded Systems (Computational Analysis, Synthesis, and Design of Dynamic Systems)
Model-Based Design for Embedded Systems (Computational Analysis, Synthesis, and Design of Dynamic Systems)

The demands of increasingly complex embedded systems and associated performance computations have resulted in the development of heterogeneous computing architectures that often integrate several types of processors, analog and digital electronic components, and mechanical and optical components—all on a single chip. As a result, now the...

Mastering Redmine
Mastering Redmine

Redmine is an open source gem for project management, and this book shows you how to exploit its features to the max. Written as a practical tutorial, it's also the perfect reference guide to have by your side.

Overview

  • Use Redmine in the most effective manner and learn to master it.
  • ...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy