Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Assessment
Network Security Assessment
Network Security Assessment offers an efficient testing model you can adopt, refine, and reuse to create proactive defensive strategies to protect your systems from the threats that are out there, as well as those still being developed. This thorough and insightful guide covers offensive technologies by...
Degunking Linux
Degunking Linux
Linux has grown in popularity and is increasingly being adopted by home users and others who laud this nearly un-crashable, free operating system. But setting up a Linux OS can be tricky and time consuming. And managing a Linux system can be even more difficult if you don't have the right knowledge. Degunking Linux expertly shows readers...
The Hacker Ethic: A Radical Approach to the Philosophy of Business
The Hacker Ethic: A Radical Approach to the Philosophy of Business

You may be a hacker and not even know it. Being a hacker has nothing to do with cyberterrorism, and it doesn’t even necessarily relate to the open-source movement. Being a hacker has more to do with your underlying assumptions about stress, time management, work, and play. It’s about harmonizing the rhythms of your creative work...

Google Talking
Google Talking
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Securing Your Business with Cisco ASA and PIX Firewalls
Securing Your Business with Cisco ASA and PIX Firewalls
The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM) Presents best practices for locking down network...
Cisco Routers for the Desperate: Router and Switch Management, the Easy Way
Cisco Routers for the Desperate: Router and Switch Management, the Easy Way

Cisco routers and switches are the cornerstones of many networks. But when things break, repairs can intimidate even the most competent administrator. Luckily, just knowing the "in case of emergency" basics will take you far.

Just like the original, this second edition of the highly acclaimed Cisco Routers for the...

Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)
Geek House: 10 Hardware Hacking Projects for Around Home (ExtremeTech)
* From the garage to the living room, Geek House provides hackers with 10 PC-based hardware hacking projects that are not for the faint of heart!
* Taking the DIY mentality to a whole new level, this book teaches techies how to hack, customize, and modify everything-from their sprinkler systems to the temperature of their barbecues
...
Arduino Projects For Dummies
Arduino Projects For Dummies

Discover all the amazing things you can do with Arduino

Arduino is a programmable circuit board that is being used by everyone from scientists, programmers, and hardware hackers to artists, designers, hobbyists, and engineers in order to add interactivity to objects and projects and experiment with programming and...

Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security: A Practical Approach (The Morgan Kaufmann Series in Networking)
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
...
Robot Builder's Bonanza, 4th Edition
Robot Builder's Bonanza, 4th Edition

Which of these fields are involved in robotics? You may choose from the following: engineering, electronics, psychology, sociology, biology, physics, artificial intelligence, math, art, mechanical design, mechanical construction, computer programming, sound synthesis, vision, ultrasonics, linguistics, microelectronics, process control,...

HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy