Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)
Tor And The Dark Net: Learn To Avoid NSA Spying And Become Anonymous Online (Dark Net, Tor, Dark Web, Tor Books) (Volume 1)

Use This Information To Avoid Being Spied By The Government Today!

If you’ve ever heard outrageous stories about online illegal drug stores, hit men for hire, celebrities busted for child porn, mad scientific experiments, and Illuminati rituals, you’ve probably heard of the “dark web”, alternatively called...

Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Pursuing an interdisciplinary approach, this book offers detailed insights into the empirical relationships between overall social key figures of states and cultures in the fields of information and communication technology (ICT) (digital divide/inequality), the economy, education and religion. Its goal is to bridge the ‘cultural...
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

Foundations of Libvirt Development: How to Set Up and Maintain a Virtual Machine Environment with Python
Foundations of Libvirt Development: How to Set Up and Maintain a Virtual Machine Environment with Python
Discover the essential concepts of libvirt development and see how to interface to Linux virtualization environments, such as QEMU/KVM, XEN, Virtuozzo, VMWare ESX, LXC, Bhyve, and more. This book will prepare you to set up and maintain a virtual machine environment.

You'll start by reviewing
...
Maple and Mathematica: A Problem Solving Approach for Mathematics
Maple and Mathematica: A Problem Solving Approach for Mathematics
In the history of mathematics there are many situations in which calculations were performed incorrectly for important practical applications. Let us look at some examples, the history of computing the number π began in Egypt and Babylon about 2000 years BC, since then many mathematicians have calculated π (e.g.,...
Modelling Metabolism with Mathematica
Modelling Metabolism with Mathematica
With the advent of sophisticated general programming environments like Mathematica, the task of developing new models of metabolism and visualizing their responses has become accessible to students of biochemistry and the life sciences in general. Modelling Metabolism with Mathematica presents the approaches, methods, tools, and algorithms...
Computational Linguistics and Talking Robots: Processing Content in Database Semantics
Computational Linguistics and Talking Robots: Processing Content in Database Semantics

The practical task of building a talking robot requires a theory of how natural language communication works. Conversely, the best way to computationally verify a theory of natural language communication is to demonstrate its functioning concretely in the form of a talking robot, the epitome of human–machine communication. To...

Voice User Interface Design: Moving from GUI to Mixed Modal Interaction
Voice User Interface Design: Moving from GUI to Mixed Modal Interaction
This is 2019. The year becomes significant when we start talking technological advancements and their effects as we move forward. Every year, we see something new, something that has the potential to change technology forever. But as American fiction author William Gibson puts it aptly, “The future is already here; it is...
Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World
Evolving Digital Leadership: How to Be a Digital Leader in Tomorrow’s Disruptive World
Get ready to be an effective digital leader, influencer, disruptor, and catalyst for change in the digital world!

As a leader you need to constantly evolve to achieve sustained success. The world is being transformed by Digital. The pace of change is constantly accelerating and volatility and complexity are the
...
Artificial Intelligence for Big Data: Complete guide to automating Big Data solutions using Artificial Intelligence techniques
Artificial Intelligence for Big Data: Complete guide to automating Big Data solutions using Artificial Intelligence techniques

Build next-generation artificial intelligence systems with Java

Key Features

  • Implement AI techniques to build smart applications using Deeplearning4j
  • Perform big data analytics to derive quality insights using Spark MLlib
  • Create self-learning systems using...
Crushing the IT Gender Bias: Thriving as a Woman in Technology
Crushing the IT Gender Bias: Thriving as a Woman in Technology
When my career first began, I was on a team of five women Database Administrators (DBAs). Within 9 months, one of the five who was hired at the same time as I was left the industry. She was young, single, had a degree in Computer Science (CS) with a focus on database technology, and had no children. I had difficulty understanding...
Result Page: 168 167 166 165 164 163 162 161 160 159 158 157 156 155 154 153 152 151 150 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy