Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Git Version Control Cookbook: Leverage version control to transform your development workflow and boost productivity, 2nd Edition
Git Version Control Cookbook: Leverage version control to transform your development workflow and boost productivity, 2nd Edition

A series of practical recipes to simplify the Git learning experience and increase your productivity when using Git version control

Key Features

  • Explore practical recipes to use Git's most advanced features
  • Learn how Git references its objects and how history is...
Hands-On Data Structures and Algorithms with Rust: Learn programming techniques to build effective, maintainable, and readable code in Rust 2018
Hands-On Data Structures and Algorithms with Rust: Learn programming techniques to build effective, maintainable, and readable code in Rust 2018

Design and implement efficient programs by exploring modern Rust data structures and algorithms

Key Features

  • Use data structures such as arrays, stacks, trees, lists, and graphs with real-world examples
  • Learn the functional and reactive implementations of traditional data...
The Complete Rust Programming Reference Guide: Design, develop, and deploy effective software systems using the advanced constructs of Rust
The Complete Rust Programming Reference Guide: Design, develop, and deploy effective software systems using the advanced constructs of Rust

Design and implement professional-level programs by leveraging modern data structures and algorithms in Rust

Key Features

  • Improve your productivity by writing more simple and easy code in Rust
  • Discover the functional and reactive implementations of traditional data...
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python

Leverage the simplicity of Python and available libraries to build web security testing tools for your application

Key Features

  • Understand the web application penetration testing methodology and toolkit using Python
  • Write a web crawler/spider with the Scrapy library
  • ...
Oracle RMAN Database Duplication
Oracle RMAN Database Duplication

RMAN is Oracle’s flagship backup and recovery tool, but did you know it’s also an effective database duplication tool? Oracle RMAN Database Duplication is a deep dive into RMAN’s duplication feature set, showing how RMAN can make it so much easier for you as a database administrator to satisfy the many requests from...

Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Algorithmic Cryptanalysis (Cryptography and Network Security)
Algorithmic Cryptanalysis (Cryptography and Network Security)
Focusing on both private- and public-key cryptographic algorithms, this book describes algorithmic methods with cryptographically relevant examples. After introducing modern cryptography and elementary number theory and algebra, it covers linear algebra, sieving, brute force, algorithms based on the birthday paradox,...
Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
Common Warehouse Metamodel: An Introduction to the Standard for Data Warehouse Integration
"The time has come for the consumers themselves to step forward and to specify a standard for meta data semantics and meta data exchange. This book is an important first step in that direction."
–W. H. Inmon, from the Foreword

The Common Warehouse Metamodel (CWM) is rapidly gaining momentum within the data warehousing...

CCDA Exam Certification Guide ((CP) CERTIFICATION)
CCDA Exam Certification Guide ((CP) CERTIFICATION)
The official study guide for DCN exam #640-441Coverage of the CCDA exam design objectives enables you to discover your knowledge gaps before the exam date. You'll learn to:Characterize a customer's existing network and identify customer needsSimplify the complexities associated with analyzing customer network problems and creating Cisco scalable...
Learning Physics Modeling with PhysX
Learning Physics Modeling with PhysX

In this day and age, physics engines play a very critical role in the success of a sophisticated game. PhysX is a state-of-the-art cross-platform physics engine widely used by top game studios and developers. It contains all the physics-related components you will need and exploits the parallel-processing capability of modern GPUs as well as...

Numerical Methods for Nonlinear Estimating Equations (Oxford Statistical Science, Vol. 29)
Numerical Methods for Nonlinear Estimating Equations (Oxford Statistical Science, Vol. 29)
This book has grown from the authors' investigations into the problem of finding consistent and efficient solutions to estimating equations which admit multiple solutions. While there have been studies of multiple roots in likelihood estimation, most notably by Barnett (1966), we felt that there was a need to incorporate more...
Result Page: 44 43 42 41 40 39 38 37 36 35 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy