Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

MCSA Guide to Microsoft SQL Server 2012 (Exam 70-462) (Networking (Course Technology)): (Exam 70-462)
MCSA Guide to Microsoft SQL Server 2012 (Exam 70-462) (Networking (Course Technology)): (Exam 70-462)

MCSA GUIDE TO MICROSOFT SQL SERVER 2012 (Exam #70-462) provides a thorough introduction to essential database administration principles and practices to prepare readers for certification and career success. Ideal for formal courses, self-study, or professional reference, this detailed text employs a lab-based approach to help users develop...

Fundamentals of Mathematics
Fundamentals of Mathematics

The FUNDAMENTALS OF MATHEMATICS, Tenth Edition, offers a comprehensive and objectives-based review of all basic mathematics concepts. The author helps learners by addressing three important needs: 1) establishing good study habits and overcoming math anxiety, 2) making the connections between mathematics and their modern, day-to-day...

Systems Bioinformatics: An Engineering Case-Based Approach
Systems Bioinformatics: An Engineering Case-Based Approach
The high-throughput nature of bioinformatics and system biology has made traditional biological methods, which tend to focus one or two molecules at a time, obsolete. It has made engineering and problem solving skills essential to attack the resulting complex, multiscale problems. Certain technologies, such as robotics automation, microfabrication,...
Semantic Web-Based Information Systems: State-of-the-Art Applications (Advances in Semantic Web and Information Systems, Vol. 1)
Semantic Web-Based Information Systems: State-of-the-Art Applications (Advances in Semantic Web and Information Systems, Vol. 1)
As a new generation of technologies, frameworks, concepts and practices for information systems emerge, practitioners, academicians, and researchers are in need of a source where they can go to educate themselves on the latest innovations in this area. Semantic Web Information Systems: State-of-the-Art Applications establishes value-added...
CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ N10-006 Cert Guide

This approved study guide helps you master topics on the CompTIA Network+ N10-006 exam, including the following:

  •  Computer network fundamentals
  • The OSI model and TCP/IP stack
  • ...
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

C in Depth :: Easy Beginner's To Expert's Guide.
C in Depth :: Easy Beginner's To Expert's Guide.

Essential C Skills-Made Easy–Without Fear!

This C Programming book gives a good start and complete introduction for C Programming for Beginner’s. Learn the all basics and advanced features of C programming in no time from Bestselling...

Result Page: 40 39 38 37 36 35 34 33 32 31 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy