Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Robust Control Systems with Genetic Algorithms (Control Series)
Robust Control Systems with Genetic Algorithms (Control Series)

In recent years, new paradigms have emerged to replace-or augment-the traditional, mathematically based approaches to optimization. The most powerful of these are genetic algorithms (GA), inspired by natural selection, and genetic programming, an extension of GAs based on the optimization of symbolic codes.

Robust
...

Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust

Get to grips with modern software demands by learning the effective uses of Rust's powerful memory safety.

Key Features

  • Learn and improve the sequential performance characteristics of your software
  • Understand the use of operating system processes in a high-scale...
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Data Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications
Data Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications
Discover hidden relationships among the variables in your data, and learn how to exploit these relationships.  This book presents a collection of data-mining algorithms that are effective in a wide variety of prediction and classification applications.  All algorithms include an intuitive explanation of operation, essential...
PowerShell and Python Together: Targeting Digital Investigations
PowerShell and Python Together: Targeting Digital Investigations
Bring together the Python programming language and Microsoft’s PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.

You will learn how to join PowerShell's robust set of commands and access to the
...
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer
Hands-On Blockchain with Hyperledger: Building decentralized applications with Hyperledger Fabric and Composer

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease

Key Features

  • Write your own chaincode/smart contracts using Golang on hyperledger network
  • Build and deploy decentralized applications (DApps)
  • Dive into real...
Truffle Quick Start Guide: Learn the fundamentals of Ethereum development
Truffle Quick Start Guide: Learn the fundamentals of Ethereum development

Develop, test, and deploy decentralized applications for Ethereum platform

Key Features

  • Build your first Ethereum Dapp with Truffle: the most popular Ethereum development framework
  • Build, compile, and deploy smart contracts in your development environment
  • ...
Bayesian Hierarchical Models: With Applications Using R, Second Edition
Bayesian Hierarchical Models: With Applications Using R, Second Edition

An intermediate-level treatment of Bayesian hierarchical models and their applications, this book demonstrates the advantages of a Bayesian approach to data sets involving inferences for collections of related units or variables, and in methods where parameters can be treated as random collections. Through illustrative data analysis...

Clojure High Performance Programming - Second Edition
Clojure High Performance Programming - Second Edition

Become an expert at writing fast and high performant code in Clojure 1.7.0

About This Book

  • Enhance code performance by using appropriate Clojure features
  • Improve the efficiency of applications and plan their deployment
  • A hands-on guide to designing Clojure programs to get...
Result Page: 42 41 40 39 38 37 36 35 34 33 32 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy