Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
C Programming :: Step By Step Beginner's To Experts Edition.
C Programming :: Step By Step Beginner's To Experts Edition.

Essential C Skills-Made Easy–Without Fear!

This C Programming book gives a good start and complete introduction for C Programming for Beginner’s. Learn the all basics and advanced features of C programming in no time from Bestselling...

BackTrack 4: Assuring Security by Penetration Testing
BackTrack 4: Assuring Security by Penetration Testing

BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your...

Embedded Robotics: Mobile Robot Design and Applications with Embedded Systems
Embedded Robotics: Mobile Robot Design and Applications with Embedded Systems

This book presents a unique combination of mobile robots and embedded systems, from introductory to intermediate level. It is structured in three parts, dealing with embedded systems (hardware and software design, actuators, sensors, PID control, multitasking), mobile robot design (driving, balancing, walking, and flying robots), and mobile...

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Structural Geology Algorithms: Vectors and Tensors
Structural Geology Algorithms: Vectors and Tensors

State-of-the-art analysis of geological structures has become increasingly quantitative but traditionally, graphical methods are used in teaching. This innovative lab book provides a unified methodology for problem-solving in structural geology using linear algebra and computation. Assuming only limited mathematical training, the book begins...

Computer Networking Illuminated (Jones and Bartlett Illuminated)
Computer Networking Illuminated (Jones and Bartlett Illuminated)
The study of computer networking concepts and administration is an essential part of the education of computer science and information science students. A basic networking course should provide a strong theoretical background, practice in network design and creation, and the experience of maintaining and managing a network. Having taught computer...
Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Deploying Raspberry Pi in the Classroom
Deploying Raspberry Pi in the Classroom

Learn how to deploy Raspberry Pi computers in a classroom or lab situation and how to navigate the hardware and software choices you face.

Deploying Raspberry Pi in the Classroom equips you with the skills and knowledge to plan and execute a deployment of Raspberry Pi computers in the classroom.  Teachers and IT...

Raspberry Pi Hacks: Tips & Tools for Making Things with the Inexpensive Linux Computer
Raspberry Pi Hacks: Tips & Tools for Making Things with the Inexpensive Linux Computer

With more than 60 practical and creative hacks, this book helps you turn Raspberry Pi into the centerpiece of some cool electronics projects. Want to create a controller for a camera or a robot? Set up Linux distributions for media centers or PBX phone systems? That’s just the beginning of what you’ll find inside...

The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Result Page: 40 39 38 37 36 35 34 33 32 31 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy