Home | Amazing | Today | Tags | Publishers | Years | Search 
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Program the Internet of Things with Swift for iOS: Learn How to Program Apps for the Internet of Things
Program the Internet of Things with Swift for iOS: Learn How to Program Apps for the Internet of Things

With this book, you will learn how to build apps and hardware for the Internet of Things, using Apple's native APIs and industry standard protocols like Bluetooth and HTTPS. You'll start out learning how to access the sensors on the iPhone, move on to building your own accessories using the Arduino and Raspberry
...
Hacking: How to Hack Computers, Basic Security and Penetration Testing
Hacking: How to Hack Computers, Basic Security and Penetration Testing

Is hacking what you want to learn? Always wondered how one becomes a hacker? Does it interest you how hackers never seem to get caught?

Download Hacking to discover everything you need to know about hacking.

Step by step to increase your hacking skill set. Learn how to penetrate computer...

C# 7.0 All-in-One For Dummies
C# 7.0 All-in-One For Dummies

Sharpen your knowledge of C#

C# know-how is a must if you want to be a professional Microsoft developer. It's also good to know a little C# if you're building tools for the web, mobile apps, or other development tasks. C# 7.0 All-in-One For Dummies offers a deep dive into C# for coders still learning the...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies
Fully updated and expanded!
  • Added steps for Windows 10 and Mac OS X El Capitan
  • Over 30% more material
  • Expanded coverage on mobile device safety
  • Expanded coverage on safety for kids online
Contains well over 100 tips with complete step-by-step
...
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

Raspberry Pi For Dummies
Raspberry Pi For Dummies

Embrace the exciting new technology of Raspberry Pi!

With the invention of the unique credit-card sized single-board computer, the Raspberry Pi, comes a new wave of hardware geeks, hackers, and hobbyists who are excited about the possibilities of the Raspberry Pi, and this is the perfect guide to get you started...

LEGO Wind Energy: Green Energy Projects with Mindstorms EV3
LEGO Wind Energy: Green Energy Projects with Mindstorms EV3
?Build functioning wind turbines that generate electricity; we don’t mean LEGO models that look like miniature wind turbines. This book is for people who want to learn how real turbines work, and to build them using LEGO and Mindstorms EV3. 

You’ll find specific...
iOS Application Security: The Definitive Guide for Hackers and Developers
iOS Application Security: The Definitive Guide for Hackers and Developers
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.

After a crash course
...
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy