BackTrack 4: Assuring Security by Penetration Testing
BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...
Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
Explore the insights and importance of testing your corporate network systems before the hackers strike
Multiple Wiener-Itô Integrals: With Applications to Limit Theorems
The goal of this Lecture Note is to prove a new type of limit theorems for normalized sums of strongly dependent random variables that play an important role in probability theory or in statistical physics. Here non-linear functionals of stationary Gaussian fields are considered, and it is shown that the theory of Wiener–Itô...
Adventures in Coding
Learn to code the "fun" way with eleven real projects for true beginners!
Adventures in Coding" is written specifically for young people who want to learn how to code, but don't know where to begin. No experience? No problem! This book starts from the very beginning to take you from newbie to app-builder in...
Professional Refactoring in C# & ASP.NET (Wrox Programmer to Programmer)
Refactoring is an effective way to quickly uncover problematic code and fix it. In this first book to provide a hands-on approach to refactoring in C# and ASP.NET, you'll discover to apply refactoring techniques to manage and modify your code. Plus, you'll learn how to build a prototype application from scratch and discover how to refactor the...
Quantum Approach to Informatics An essential overview of quantum information
Information, whether inscribed as a mark on a stone tablet or encoded as a magnetic domain on a hard drive, must be stored in a physical object and thus made subject to the laws of physics. Traditionally, information processing such as computation occurred in a framework governed by laws of classical...
|Result Page: 55 54 53 52 51 50 49 48 47 46 |