 |
|
 Mobile Device Security For Dummies
The information you need to avoid security threats on corporate mobile devices
Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a... |  |  Metasploit Penetration Testing Cookbook, Second Edition
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in... |  |  Makers at Work: Folks Reinventing the World One Object or Idea at a Time
What do you get when you combine an electronics hobbyist, hacker, garage mechanic, kitchen table inventor, tinkerer, and entrepreneur? A “maker,” of course. Playful and creative, makers are—through expertise and experimentation—creating art, products, and processes that change the way we think and interact with the... |
|
 Instant Metasploit Starter
The Metasploit framework is an exploit development framework. It has evolved as a one stop shop for all the needs of ethical hacking. For a beginner who wishes to learn the framework and domain, Metasploit provides everything to make your life easier and secure your world from attackers.
This book is written in such a way that... |  |  |  |  Hacking For Dummies
Updated for Windows 8 and the latest version of Linux
The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully... |
|
 Raspberry Pi User Guide
Make the most out of the world’s first truly compact computer
It's the size of a credit card, it can be charged like a smartphone, it runs on open-source Linux, and it holds the promise of bringing programming and playing to millions at low cost. And now you can learn how to use this amazing computer from its... |  |  Network Backup with Bacula [How-to]
In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.
"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system... |  |  |
|
|
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |