Home | Amazing | Today | Tags | Publishers | Years | Search 
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Learn Windows IIS in a Month of Lunches
Learn Windows IIS in a Month of Lunches

Summary

Learn Windows IIS in a Month of Lunches is an innovative tutorial designed for busy administrators. Even if you have no prior exposure to IIS, you can follow the crisp explanations, examples, and exercises in this concise, easy-to-read book. Just set aside one hour a day—lunchtime would be...

MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 (Cert Guides)
MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 (Cert Guides)

The study guide helps you master all the topics on the MCSA 70-410 exam, including the following:

  • Installing and configuring Windows Server 2012
  • Configuring storage, shares, and permissions
  • ...
Atlas of Clinically Important Fungi
Atlas of Clinically Important Fungi

Although there are many texts that provide quality information for the identification of fungi, researchers and technologists rarely have time to read the text. Most are rushed for time and seek morphological information that helps guide them to the identification of fungi.

The Atlas of Clinically Important Fungi provides...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)

The best fully integrated study system available for the CompTIA Security+ exam!

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

With hundreds of...

We Are Not Refugees: True Stories of the Displaced
We Are Not Refugees: True Stories of the Displaced
Never in history have so many people been displaced by political and military conflicts at home—more than 65 million globally. Unsparing, outspoken, vital, We Are Not Refugees tells the stories of many of these displaced, who have not been given asylum.

"With the keen eye and sharp pen of a
...
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Master the tools and techniques of mobile forensic investigations

...
Carbon Allotropes: Metal-Complex Chemistry, Properties and Applications
Carbon Allotropes: Metal-Complex Chemistry, Properties and Applications

This book provides a detailed description of metal-complex functionalized carbon allotrope forms, including classic (such as graphite), rare (such as M- or T-carbon), and nanoforms (such as carbon nanotubes, nanodiamonds, etc.). Filling a void in the nanotechnology literature, the book presents chapters generalizing the synthesis,...

Practice Makes Perfect: Basic English, Premium Third Edition
Practice Makes Perfect: Basic English, Premium Third Edition
Get the skills you need to read and speak English with confidence!


Learn how to read and speak English with this easy-to-use workbook. Dozens of manageable, bite-sized lessons take you through the basics of the English language. Three-page units cover each subject, which can be completed in just 20
...
Pediatric Autoimmunity and Transplantation: A Case-Based Collection with MCQs, Volume 3
Pediatric Autoimmunity and Transplantation: A Case-Based Collection with MCQs, Volume 3

This book is a collection of case-based questions, directed towards and meticulously selected to cover the most common and important aspects of pediatric autoimmune disorders. Autoimmune disorders of infancy and childhood, rheumatological disorders, dermatologic autoimmune disorders, autoinflammatory disorders, and clinical...

Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy