Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

Essential Skills for Hackers
Essential Skills for Hackers

Essential Skills for Hackers is about the skills you need to be in the elite hacker family.

The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

Raspberry Pi Cookbook: Software and Hardware Problems and Solutions
Raspberry Pi Cookbook: Software and Hardware Problems and Solutions

With millions of new users and several new models, the Raspberry Pi ecosystem continues to expand—along with a lot of new questions about the Pi’s capabilities. The second edition of this popular cookbook provides more than 240 hands-on recipes for running this tiny low-cost computer with Linux, programming it with...

Data Just Right: Introduction to Large-Scale Data & Analytics (Addison-Wesley Data & Analytics Series)
Data Just Right: Introduction to Large-Scale Data & Analytics (Addison-Wesley Data & Analytics Series)

Making Big Data Work: Real-World Use Cases and Examples, Practical Code, Detailed Solutions

 

Large-scale data analysis is now vitally important to virtually every business. Mobile and social technologies are generating massive datasets;...

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Programming Challenges
Programming Challenges
There are many distinct pleasures associated with computer programming. Craftsmanship
has its quiet rewards, the satisfaction that comes from building a useful object and
making it work. Excitement arrives with the flash of insight that cracks a previously
intractable problem. The spiritual quest for elegance can turn the hacker into
...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Result Page: 24 23 22 21 20 19 18 17 16 15 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy