Home | Amazing | Today | Tags | Publishers | Years | Search 
Society and Health: Sociology for Health Professionals
Society and Health: Sociology for Health Professionals

The publication of Society and Health: Sociology for Health Professionals represents the results of an information-gathering process that has extended over a 30-year career as a health professional. It reflects a determination to frame medical sociology as a multidisciplinary endeavor that must, of necessity, draw information from a wide...

Ensemble Machine Learning: Methods and Applications
Ensemble Machine Learning: Methods and Applications

It is common wisdom that gathering a variety of views and inputs improves the process of decision making, and, indeed, underpins a democratic society. Dubbed “ensemble learning” by researchers in computational intelligence and machine learning, it is known to improve a decision system’s robustness and accuracy. Now, fresh...

Competitive Intelligence: Gathering, Analysing And Putting It to Work
Competitive Intelligence: Gathering, Analysing And Putting It to Work

Every business manager needs intelligence to find suppliers, mobilize capital, win customers and fend off rivals. Obtaining this is often an unplanned, instinctive process. The manager who has a conscious, systematic approach to acquiring intelligence will be better placed to recognize and seize opportunities whilst safeguarding the...

Instant Kali Linux
Instant Kali Linux

Kali Linux is currently the de-facto standard operating system of the security industry. It acts as a Swiss army knife and is a one-stop solution to most of the problems faced by security professionals. The availability of different open source and free tools under a single banner makes it easy and quick while dealing with security...

The Customer Rules
The Customer Rules
At a recent family gathering in my home, the grown-ups were trading stories about companies that provide good customer service and those that don't. Out of curiosity, I asked my then twelve-year-old granddaughter, Margot, what she thought were the most important rules for great service. Without a moment's hesitation, she...
Beginning Haskell: A Project-Based Approach
Beginning Haskell: A Project-Based Approach

Beginning Haskell provides a broad-based introduction to the Haskell language, its libraries and environment, and to the functional programming paradigm that is fast growing in importance in the software industry. The book takes a project-based approach to learning the language that is unified around the building of a web-based...

The Art of Wireless Sensor Networks: Volume 1: Fundamentals
The Art of Wireless Sensor Networks: Volume 1: Fundamentals

During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.  

“The Art of Wireless Sensor Networks: Volume 1: Fundamentals” focuses on the fundamentals concepts in the design, analysis, and implementation of...

iOS Application Security: The Definitive Guide for Hackers and Developers
iOS Application Security: The Definitive Guide for Hackers and Developers
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.

After a crash course
...
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy