Home | Amazing | Today | Tags | Publishers | Years | Search 
Mobile Device Security For Dummies
Mobile Device Security For Dummies

The information you need to avoid security threats on corporate mobile devices

Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a...

Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It
Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It

As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to...

Network Backup with Bacula [How-to]
Network Backup with Bacula [How-to]

In the data-centered world, backup and duplication is an important factor that keeps your computer network fail-safe and healthy. Backup solutions allow you to quickly recover from power failures, damaged hardware and hacker attacks.

"Network Backup with Bacula" is a practical guide to setting up the Bacula backup system...

Raspberry Pi User Guide
Raspberry Pi User Guide

Make the most out of the world’s first truly compact computer

It's the size of a credit card, it can be charged like a smartphone, it runs on open-source Linux, and it holds the promise of bringing programming and playing to millions at low cost. And now you can learn how to use this amazing computer from its...

Hacking For Dummies
Hacking For Dummies

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully...

Hacking Capitalism: The Free and Open Source Software Movement (Routledge Research in Information Technology and Society)
Hacking Capitalism: The Free and Open Source Software Movement (Routledge Research in Information Technology and Society)

The Free and Open Source Software (FOSS) movement demonstrates how labour can self-organise production, and, as is shown by the free operating system GNU/Linux, even compete with some of the worlds largest firms. The book examines the hopes of such thinkers as Friedrich Schiller, Karl Marx, Herbert Marcuse and Antonio Negri, in the light of...

Instant Metasploit Starter
Instant Metasploit Starter

The Metasploit framework is an exploit development framework. It has evolved as a one stop shop for all the needs of ethical hacking. For a beginner who wishes to learn the framework and domain, Metasploit provides everything to make your life easier and secure your world from attackers.

This book is written in such a way that...

Makers at Work: Folks Reinventing the World One Object or Idea at a Time
Makers at Work: Folks Reinventing the World One Object or Idea at a Time

What do you get when you combine an electronics hobbyist, hacker, garage mechanic, kitchen table inventor, tinkerer, and entrepreneur? A “maker,” of course. Playful and creative, makers are—through expertise and experimentation—creating art, products, and processes that change the way we think and interact with the...

Metasploit Penetration Testing Cookbook, Second Edition
Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in...

Data Just Right: Introduction to Large-Scale Data & Analytics (Addison-Wesley Data & Analytics Series)
Data Just Right: Introduction to Large-Scale Data & Analytics (Addison-Wesley Data & Analytics Series)

Making Big Data Work: Real-World Use Cases and Examples, Practical Code, Detailed Solutions

 

Large-scale data analysis is now vitally important to virtually every business. Mobile and social technologies are generating massive datasets;...

Perl One-Liners: 130 Programs That Get Things Done
Perl One-Liners: 130 Programs That Get Things Done

Part of the fun of programming in Perl lies in tackling tedious tasks with short, efficient, and reusable code. Often, the perfect tool is the one-liner, a small but powerful program that fits in one line of code and does one thing really well.

In Perl One-Liners, author and impatient hacker Peteris
...

What Every Engineer Should Know About Cyber Security and Digital Forensics
What Every Engineer Should Know About Cyber Security and Digital Forensics
Long gone are the days where the security of your critical data could be protected by security guards, cipher locks, and an ID badge worn by all employees. As the computing paradigm is continually changing with shared resources and mobility, firewalls and antivirus software are also not enough to protect critical assets. This...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy