 |
|
 Building a Home Security System with BeagleBone
With Boost libraries you can really unleash the power of C++. Learn to build applications faster and better through a cookbook approach that uses tons of recipes to make it all so easy to assimilate and apply.
-
Build your own state-of-the-art security system
-
Monitor your system from anywhere you can receive...
|  |  The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.
It is intended mainly for beginners to the field of... |  |  Java Security (Java Series)
Java's most striking claim is that it provides a secure programming environment. However, despite lots of discussion, few people understand precisely what Java's claims mean and how it backs up those claims. Java Security is an in-depth exploration aimed at developers, network administrators, and anyone who needs to work with... |
|
 Security for Multihop Wireless Networks
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area... |  |  Kali Linux: Assuring Security By Penetration Testing
Master the art of penetration testing with Kali Linux
Overview
-
Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
-
Explore the insights and importance of testing your corporate network systems before the hackers strike
-
Understand the...
|  |  Practical Oracle Database Appliance
Practical Oracle Database Appliance is a hands-on book taking you through the components and implementation of the Oracle Database Appliance. Learn about architecture, installation, configuration, and reconfiguration. Install and configure the Oracle Database Appliance with confidence. Make the right choices between the various... |
|
 Web Penetration Testing with Kali Linux
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
Overview
-
Learn key reconnaissance concepts needed as a penetration tester
-
Attack and exploit key features, authentication, and sessions on web...
|  |  Network Security Through Data Analysis: Building Situational Awareness
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what... |  |  VMware View Security Essentials
Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the issue and recovering... |
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 |