Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Your UNIX/Linux: The Ultimate Guide
Your UNIX/Linux: The Ultimate Guide

Your UNIX/Linux: The Ultimate Guide, written with both users and programmers in mind, is the ultimate UNIX/Linux text. Both pedagogical tool and exhaustive reference, it is well-suited to any course that includes UNIX or Linux. A strong pedagogical framework sets it apart from similar texts and allows beginning students to gain a firm grasp...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

CoreOS in Action: Running Applications on Container Linux
CoreOS in Action: Running Applications on Container Linux

Summary

CoreOS in Action is a clear tutorial for deploying container-based systems on CoreOS Container Linux.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

Traditional Linux...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Docker Bootcamp
Docker Bootcamp

Fast, intensive, and effective Docker learning

About This Book

  • Get well-versed with Docker in 7 days
  • Identify and resolve common problems faced by users while working with Docker
  • A fast-paced guide that will focus on all the core Docker functionalities

...

Fundamentals of Web Development
Fundamentals of Web Development

Fundamentals of Web Development covers the broad range of topics required for modern web development (both client- and server-side) and is appropriate for students who have taken a CS1 course sequence.


The book guides students through the creation of enterprise-quality...

Bash it Out!: Strengthen your Bash knowledge with 17 scripting challenges of varied difficulties
Bash it Out!: Strengthen your Bash knowledge with 17 scripting challenges of varied difficulties

Do you want to improve your Bash skills? Be aware of the common or not-so-common pitfalls of interactive Bash usage? Or simply test your friends (and/or your employees!) with subtle brainteasers? Then, this book is for you! The goal of the book is to let you discover a thing or two about the Bash and Linux/Unix command line by solving...

Game Programming All in One
Game Programming All in One

Create your own high-caliber games with some of the same tools used by professional game developers! If you have a working knowledge of C or C++, then "Game Programming All in One, 2nd Edition" can get you started on your journey. It uses hands-on projects to explain each new subject and includes many sample programs to reinforce...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
DevOps Troubleshooting: Linux Server Best Practices
DevOps Troubleshooting: Linux Server Best Practices

“If you’re a developer trying to figure out why your application is not responding at 3 am, you need this book! This is now my go-to book when diagnosing production issues. It has saved me hours in troubleshooting complicated operations problems.”

Trotter Cashion,...

Yocto for Raspberry Pi
Yocto for Raspberry Pi

Create unique and amazing projects by using the powerful combination of Yocto and Raspberry Pi

About This Book

  • Set up and configure the Yocto Project efficiently with Raspberry Pi
  • Deploy multimedia applications from existing Yocto/OE layers
  • An easy-to-follow guide to...
Result Page: 117 116 115 114 113 112 111 110 109 108 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy