Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Wireless Security Handbook
Wireless Security Handbook
This book was written to give the reader a well-rounded understanding
of wireless network security. It looks at wireless from multiple perspectives,
ranging from auditor, to security architect, to hacker. This wide
scope benefits anyone who has to administer, secure, hack, or participate
on a wireless network. Going through this
...
Practical Application Development with AppRun: Building Reliable, High-Performance Web Apps Using Elm-Inspired Architecture, Event Pub-Sub, and Components
Practical Application Development with AppRun: Building Reliable, High-Performance Web Apps Using Elm-Inspired Architecture, Event Pub-Sub, and Components

Explore the concepts, patterns, and architecture behind AppRun applications. With this end-to-end guide, you will be able to build web apps fast to the market with the low learning curve and high development productivity.

You will learn how to break down the application logic into three decoupled parts:...

The New Shop Class: Getting Started with 3D Printing, Arduino, and Wearable Tech
The New Shop Class: Getting Started with 3D Printing, Arduino, and Wearable Tech

The New Shop Class connects the worlds of the maker and hacker with that of the scientist and engineer. If you are a parent or educator or a budding maker yourself, and you feel overwhelmed with all of the possible technologies, this book will get you started with clear discussions of what open source technologies like 3D printers,...

The Hacker Playbook: Practical Guide To Penetration Testing
The Hacker Playbook: Practical Guide To Penetration Testing

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the...

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Two Scoops of Django: Best Practices For Django 1.5
Two Scoops of Django: Best Practices For Django 1.5

Update!

The third edition, Two Scoops of Django: Best Practices For Django 1.8 is available! Revised and expanded to 532 pages, it's a whole new book full of new material. Please consider it before purchasing this edition!

http://www.amazon.com/Two-Scoops-Django-Best-Practices/dp/0981467342

...
GNOME 3 Application Development Beginner's Guide
GNOME 3 Application Development Beginner's Guide

Step-by-step practical guide to get to grips with GNOME application development

Overview

  • Full of easy to follow tutorials with ready-to-run code.
  • Covers most of the subsystems in the GNOME 3 platform stack, from low to high level.
  • Adapts common good development practices with...
Result Page: 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy