Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Ethical Hacking
Ethical Hacking
By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide to system security provides the tools necessary for approaching computers with the skill and understanding of an outside hacker. A useful tool for those involved in securing networks from outside tampering, this guide to CEH 312-50...
Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game
Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and...

XML in Flash (Sams Other)
XML in Flash (Sams Other)
XML in Flash is an excellent introduction to creating state-of-the-art Flash applications with XML. XML is quickly becoming the most popular way to store and manage data. Flash's XML Socket makes it possible to network Flash front-ends to an application server. This allows developers to use a Flash interface for applications such as message boards,...
CMS Design Using PHP and jQuery
CMS Design Using PHP and jQuery

PHP and jQuery are two of the most famous open source frameworks used for web development. This book will explain how to leverage their power by building a core CMS which can be used for most projects without needing to be written, and how to add custom plugins that can then be tailored to the individual project.

This book walks...

Going Mod: 9 Cool Case Mod Projects
Going Mod: 9 Cool Case Mod Projects
You're about to come down with a case of mod

Face it—you're just not a boring beige box person. If you were, you'd never have picked up this book. So if you've even fantasized about making your computer case scream "cool," don't put it down. Part I shows you the tools you need and how to use them. Part II frees your creativity,...

Beginning Android ADK with Arduino (Beginning Apress)
Beginning Android ADK with Arduino (Beginning Apress)
In May 2011, Google held its annual developer conference, the Google IO, to present its newest technologies to approximately 5,000 attendees. In addition to improvements in its already well-known technologies such as the Google APIs or the core search technology, Google placed the focus on two major themes: Chrome and Android. As...
Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss...
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
A Programmer's Guide to Drupal
A Programmer's Guide to Drupal
Welcome! This book is meant to launch you into the world of programming with the open-source web content management system known as Drupal. Hopefully, with the aid of this book, you will pass smoothly through the stage of being a novice Drupal programmer, while avoiding making the mistakes that many expert Drupal...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy