Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Programming Multicore and Many-core Computing Systems (Wiley Series on Parallel and Distributed Computing)
Programming Multicore and Many-core Computing Systems (Wiley Series on Parallel and Distributed Computing)

Programming multi-core and many-core computing systems

Sabri Pllana, Linnaeus University, Sweden

Fatos Xhafa, Technical University of Catalonia, Spain

Provides state-of-the-art methods for programming multi-core and many-core systems

The book comprises a selection of twenty two...

Network Routing: Fundamentals, Applications, and Emerging Technologies
Network Routing: Fundamentals, Applications, and Emerging Technologies

Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Professional Financial Computing Using Excel and VBA
Professional Financial Computing Using Excel and VBA

"Professional Financial Computing Using Excel and VBA is an admirable exposition that bridges the theoretical underpinnings of financial engineering and its application which usually appears as a "black-box" software application. The book opens the black-box and reveals the architecture of risk-modeling and financial...

Kernel Smoothing: Principles, Methods and Applications
Kernel Smoothing: Principles, Methods and Applications

Comprehensive theoretical overview of kernel smoothing methods with motivating examples

Kernel smoothing is a flexible nonparametric curve estimation method that is applicable when parametric descriptions of the data are not sufficiently adequate. This book explores theory and methods of kernel smoothing in a variety of...

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Web Design with HTML and CSS Digital Classroom, (Book and Video Training)
Web Design with HTML and CSS Digital Classroom, (Book and Video Training)

"An invaluable full-color training package for Web design

Web design consists of using multiple software tools and codes-such as Dreamweaver, Flash, Silverlight, Illustrator, Photoshop, HTML, and CSS, among others-to craft a unique, robust, and interactive websites. This book teaches you how to effectively use all the major...

Database Design and Development: An Essential Guide for IT Professionals
Database Design and Development: An Essential Guide for IT Professionals

The first and only database primer for today's global economy

Today's businesses depend on their databases to provide information essential for their day-to-day operations and to help them take advantage of today's rapidly growing and maturing electronic commerce opportunities. The primary responsibility for the design...

Numerical and Analytical Methods for Scientists and Engineers, Using Mathematica
Numerical and Analytical Methods for Scientists and Engineers, Using Mathematica
Up to this point in your career you have been asked to use mathematics to solve rather elementary problems in the physical sciences. However, when you graduate and become a working scientist or engineer you will often be confronted with complex real-world problems. Understanding the material in this book is a first step toward...
Result Page: 368 367 366 365 364 363 362 361 360 359 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy