|
|
|
|
|
|
Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.
You'll learn how to configure your network from the ground up, starting by setting up your... | | The Art of Deception: Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in... | | Peter Norton's New Inside the PCNo competing book provides a more in-depth understanding of the working principles and operations of the computer to a general audience. Ensures maximum productivity by providing an intimate working knowledge of the personal computer at all levels. Uses the unique "Peter Norton" approach: expert advice in a user-friendly, hands-on... |
|
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |