Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X
MAC OS X UNIX Toolbox: 1000+ Commands for the Mac OS X

Explore a ton of powerful Mac OS X UNIX commands

This handy, compact guide teaches you to use Mac OS X UNIX systems as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Apply the skills you learn from this book to...

Neuroengineering
Neuroengineering
Comprehensive, practical, and broad in scope, Neuroengineering offers clinical insights on revolutionary technologies from prominent neurosurgeons and neurologists. This book presents a wide range of new developments in the field and high-impact emerging technologies that are poised to change the industry, described in detailed...
How to Cheat at Configuring VmWare ESX Server
How to Cheat at Configuring VmWare ESX Server
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine...
IP Routing Primer Plus
IP Routing Primer Plus
IP Routing Primer Plus takes the reader on a methodical journey through the OSI model and shows the relationship of the different IP protocol suite. It gives the readers a "big picture view" design to equip them to use the protocols, or to prepare for a certification exam. Topics covered include a review of the OSI model as well as:
Data Mining Cookbook: Modeling Data for Marketing, Risk and Customer Relationship Management
Data Mining Cookbook: Modeling Data for Marketing, Risk and Customer Relationship Management
Get a data mining recipe for success to increase profits and reduce costs in today’s business world with–This book shows you how to create and implement models of the most commonly asked data mining questions for marketing, sales, risk analysis, and customer relationship management and support. You’ll get proven modeling...
Professional Wikis (Programmer to Programmer)
Professional Wikis (Programmer to Programmer)

The success of Wikipedia has proven just how effective wikis can be for collaborative editing on a large scale—larger than anyone originally thought possible. This book shows you how to install, use, manage, and extend a wiki using MediaWiki—the wiki engine used to power Wikipedia.

As each chapter builds on previous...

Journey to Data Quality
Journey to Data Quality
"The issue of data quality has become increasingly important over the last decade as the amount of data being collected and stored continues to increase at a rapid rate. These researchers have been at the forefront of understanding the impact and implication of the quality of data on organizations. These issues will continue to grow in...
Python Essential Reference (4th Edition)
Python Essential Reference (4th Edition)
Python Essential Reference is the definitive reference guide to the Python programming language — the one authoritative handbook that reliably untangles and explains both the core Python language and the most essential parts of the Python library.

Designed for the professional programmer, the book...

Technology Paradise Lost: Why Companies Will Spend Less to Get More from Information Technology
Technology Paradise Lost: Why Companies Will Spend Less to Get More from Information Technology
Debunking many of today’s myths about the future prospects and growth of information technology, this book uses a variety of well-accepted economic, technological, and market data to come to the contrary conclusion that IT is poised to shrink and not grow. Discussed is how this conclusion does not imply that companies will slow their use...
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Art of Intrusion : The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
"Enter the hostile world of computer crime from the comfort of your own armchair. Mitnick presents ten compelling chapters, each the result of an interview with a real hacker about a real attack. A must-read for anyone with an interest in information security"
—Tom Parker, Computer Security Analyst and founder of Global
...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy