Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Deploying Raspberry Pi in the Classroom
Deploying Raspberry Pi in the Classroom

Learn how to deploy Raspberry Pi computers in a classroom or lab situation and how to navigate the hardware and software choices you face.

Deploying Raspberry Pi in the Classroom equips you with the skills and knowledge to plan and execute a deployment of Raspberry Pi computers in the classroom.  Teachers and IT...

Essentials of Computer Architecture
Essentials of Computer Architecture

This easy to read textbook provides an introduction to computer architecture, while focusing on the essential aspects of hardware that programmers need to know. The topics are explained from a programmer’s point of view, and the text emphasizes consequences for programmers. Divided in five parts, the book covers the basics of digital...

WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV: Computer Vision with the OpenCV Library
Learning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the...
Graph Analysis and Visualization: Discovering Business Opportunity in Linked Data
Graph Analysis and Visualization: Discovering Business Opportunity in Linked Data

Wring more out of the data with a scientific approach to analysis

Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the...

Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO (From Technologies to Solutions)
Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO (From Technologies to Solutions)
In Detail

Blogger is a blog publishing system from Google with a friendly interface specifically designed for creating and maintaining weblogs.

It allows users to easily create dynamic blogs with great content and many outstanding features including RSS feeds, link-backs, photo slideshows, and integration with...

Systems Bioinformatics: An Engineering Case-Based Approach
Systems Bioinformatics: An Engineering Case-Based Approach
The high-throughput nature of bioinformatics and system biology has made traditional biological methods, which tend to focus one or two molecules at a time, obsolete. It has made engineering and problem solving skills essential to attack the resulting complex, multiscale problems. Certain technologies, such as robotics automation, microfabrication,...
Result Page: 41 40 39 38 37 36 35 34 33 32 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy