Home | Amazing | Today | Tags | Publishers | Years | Search 
Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Learn Windows IIS in a Month of Lunches
Learn Windows IIS in a Month of Lunches

Summary

Learn Windows IIS in a Month of Lunches is an innovative tutorial designed for busy administrators. Even if you have no prior exposure to IIS, you can follow the crisp explanations, examples, and exercises in this concise, easy-to-read book. Just set aside one hour a day—lunchtime would be...

MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 (Cert Guides)
MCSA 70-410 Cert Guide R2: Installing and Configuring Windows Server 2012 (Cert Guides)

The study guide helps you master all the topics on the MCSA 70-410 exam, including the following:

  • Installing and configuring Windows Server 2012
  • Configuring storage, shares, and permissions
  • ...
Atlas of Clinically Important Fungi
Atlas of Clinically Important Fungi

Although there are many texts that provide quality information for the identification of fungi, researchers and technologists rarely have time to read the text. Most are rushed for time and seek morphological information that helps guide them to the identification of fungi.

The Atlas of Clinically Important Fungi provides...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)

The best fully integrated study system available for the CompTIA Security+ exam!

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

With hundreds of...

MCSA Guide to Microsoft SQL Server 2012 (Exam 70-462) (Networking (Course Technology)): (Exam 70-462)
MCSA Guide to Microsoft SQL Server 2012 (Exam 70-462) (Networking (Course Technology)): (Exam 70-462)

MCSA GUIDE TO MICROSOFT SQL SERVER 2012 (Exam #70-462) provides a thorough introduction to essential database administration principles and practices to prepare readers for certification and career success. Ideal for formal courses, self-study, or professional reference, this detailed text employs a lab-based approach to help users develop...

WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Essentials of Computer Architecture
Essentials of Computer Architecture

This easy to read textbook provides an introduction to computer architecture, while focusing on the essential aspects of hardware that programmers need to know. The topics are explained from a programmer’s point of view, and the text emphasizes consequences for programmers. Divided in five parts, the book covers the basics of digital...

The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
Even if the NFC standard is young (developed in 2004), I have been asked to write this book for several years now, due to the pioneering role played in France (and in Europe) by our Computer Science Master’s degree MBDS (www.mbds-fr.org) at the University of Nice – Sophia-Antipolis around the prototyping of innovative...
Penetration Testing Essentials
Penetration Testing Essentials
Your pen testing career begins here, with a solid foundation in essential skills and concepts

Penetration Testing Essentials provides a starting place for professionals and beginners looking to learn more about penetration testing for cybersecurity. Certification eligibility requires work experience—but before...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy