Home | Amazing | Today | Tags | Publishers | Years | Search 
Kali Linux Social Engineering
Kali Linux Social Engineering

Effectively perform effi cient and organized social engineering tests and penetration testing using Kali Linux

Overview

  • Learn about various attacks and tips and tricks to avoid them
  • Get a grip on efficient ways to perform penetration testing.
  • Use advanced techniques to bypass...
E-Habits: What You Must Do to Optimize Your Professional Digital Presence
E-Habits: What You Must Do to Optimize Your Professional Digital Presence

What Does the Digital You Look Like?

What you read • Where you shop • How you communicate with coworkers, friends, and strangers • Whom you interact with on social networking sites . . . these are just a few of the things that make up the Digital You.

"The Digital You is a complex mosaic of...

Molecular Basis of Memory, Volume 122 (Progress in Molecular Biology and Translational Science)
Molecular Basis of Memory, Volume 122 (Progress in Molecular Biology and Translational Science)

This special volume of Progress in Molecular Biology and Translational Science provides a current overview of how memory is processed in the brain. A broad range of topics are presented by leaders in the field, ranging from brain circuitry to synaptic plasticity to the molecular machinery that contributes to the brain's...

Multiple Sclerosis Rehabilitation: From Impairment to Participation (Rehabilitation Science in Practice Series)
Multiple Sclerosis Rehabilitation: From Impairment to Participation (Rehabilitation Science in Practice Series)

"MS is always in the back of your mind. If there is something you want to do, you always wonder if the MS will allow you do to it."
—Darlene, living with MS for 22 years

Living with multiple sclerosis (MS) is challenging and multidimensional. MS pervades all aspects of life: one’s body becomes...

The Politics of National Celebrations in the Arab Middle East (English and English Edition)
The Politics of National Celebrations in the Arab Middle East (English and English Edition)

Why do countries celebrate defining religious moments or significant events in their history, and how and why do their leaders select certain events for commemoration and not others? This book is the first systematic study of the role of celebrations and public holidays in the Arab Middle East from the fall of the Ottoman Empire to the...

Scientific Computing and Cultural Heritage: Contributions in Computational Humanities (Contributions in Mathematical and Computational Sciences)
Scientific Computing and Cultural Heritage: Contributions in Computational Humanities (Contributions in Mathematical and Computational Sciences)

The sheer computing power of modern information technology is changing the face of research not just in science, technology and mathematics, but in humanities and cultural studies too. Recent decades have seen a major shift both in attitudes and deployment of computers, which are now vital and highly effective tools in disciplines where they...

Alchemy and Psychotherapy: Post-Jungian Perspectives
Alchemy and Psychotherapy: Post-Jungian Perspectives

Alchemical symbols are part of popular culture, most recently popularised in the Harry Potter books. Alchemy intrigued Carl Jung, the founder of analytical psychology. It inspired him as he wrote ‘the Red Book’ - the journal of his voyage of internal discovery. He devoted much of his life to it, using alchemical symbols as...

Always Use Protection: A Teen's Guide to Safe Computing
Always Use Protection: A Teen's Guide to Safe Computing
Dan Appleman's career is typical of someone who, unable to choose what he wants to do for a living, decides to do everything. From founding a software company (Desaware), to cofounding a publishing company (Apress), to programming, to writing books (this is his seventh), he's a Brm believer that the question 'What do...
Blockchain: Blueprint for a New Economy
Blockchain: Blueprint for a New Economy

Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. This book takes you beyond the currency ("Blockchain 1.0") and smart contracts ("Blockchain 2.0") to demonstrate how the blockchain is in position to become the fifth...

Web Navigation: Designing the User Experience
Web Navigation: Designing the User Experience

Web Navigation: Designing the User Experience offers the first in depth look at designing web site navigation. Author Jennifer Fleming offers design strategies to help you uncover solutions that work for your site and audience.Acclaimed Web design author Lynda Weinman says in the foreword to this book: "Kudos to Fleming...

Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy