Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring
MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring

MCTS 70-620 Exam Prep: Microsoft Windows Vista, Configuring is designed for network administrators, network engineers, and consultants who are pursuing the Microsoft Certified Technology Specialist (MCTS) or Microsoft Certified IT Professional (MCITP) certifications for Windows Vista. This book covers the "TS: Microsoft Windows...

The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Designing Collaborative Systems: A Practical Guide to Ethnography (Computer Supported Cooperative Work)
Designing Collaborative Systems: A Practical Guide to Ethnography (Computer Supported Cooperative Work)
Designing Collaborative Systems: A Practical Guide to Ethnography introduces a new 'ethnographic' approach that will enable designers to create collaborative and interactive systems, which are employed successfully in real-world settings. This new approach, adapted from the field of social research, considers both the social...
Open Source E-mail Security (Kaleidoscope)
Open Source E-mail Security (Kaleidoscope)
In this book you'll learn the technology underlying secure e-mail systems, from the protocols involved to the open source software packages used to implement e-mail security. This book explains the secure MIME (S/MIME) protocol and how it is used to protect data transmitted across the Internet. It also explains the concepts crucial to stopping...
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Linux Cluster Architecture (Kaleidoscope)
Linux Cluster Architecture (Kaleidoscope)
Cluster computers provide a low-cost alternative to multiprocessor systems for many applications. Building a cluster computer is within the reach of any computer user with solid C programming skills and a knowledge of operating systems, hardware, and networking. This book leads you through the design and assembly of such a system, and shows you how...
Control Systems Engineering
Control Systems Engineering

Highly regarded for its accessible writing and practical case studies, Control Systems Engineering is the most widely adopted textbook for this core course in Mechanical and Electrical engineering programs. This new sixth edition has been revised and updated with 20% new problems and greater emphasis on computer-aided design.

...

Virtual Futures for Design, Construction and Procurement
Virtual Futures for Design, Construction and Procurement
"For the knowledgeable reader in ICT research it is a must to confirm where technology is now and moreover to see where it is going in the future." Building Engineer

Bill Bygrave is the Director of the Center for Entrepreneurial Studies at Babson College, where he also teaches Free Enterprise.
...
Swing Extreme Testing: The Extreme approach to complete Java application testing
Swing Extreme Testing: The Extreme approach to complete Java application testing

This book summarizes twenty years of experience testing software.

For the past decade, we have been the principal developers of LabWizard, which is the gold standard in Knowledge Acquisition tools and is used around the world to provide patient-specific interpretations of pathology cases. LabWizard is a very complex suite of...

Fractional Order Motion Controls
Fractional Order Motion Controls

Covering fractional order theory, simulation and experiments, this book explains how fractional order modelling and fractional order controller design compares favourably with traditional velocity and position control systems. The authors systematically compare the two approaches using applied fractional calculus. Stability theory in...

IP Routing Primer Plus
IP Routing Primer Plus
IP Routing Primer Plus takes the reader on a methodical journey through the OSI model and shows the relationship of the different IP protocol suite. It gives the readers a "big picture view" design to equip them to use the protocols, or to prepare for a certification exam. Topics covered include a review of the OSI model as well as:
unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy