 |
|
|
 Black Hat Python: Python Programming for Hackers and Pentesters
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's... |  |  Computer Security for the Home and Small Office
Computer Security for the Home and Small Office addresses the long-neglected security needs of everyday users in the home, company workstation, and SOHO (small office/home office) categories, with emphasis on system hardening, eliminating malware, user and Internet privacy, encryption, and data hygiene.
The book offers... |  |  |
|
|
 Microsoft Exchange Server 2013 Inside Out Connectivity, Clients, and UM
With a focus on connectivity, clients, and unified messaging, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Paul Robichaux, a Microsoft MVP and popular author, you will:
-
Understand how Exchange Server 2013 works with previous...
|  |  |  |  Learning Linux Binary Analysis
Key Features
-
Grasp the intricacies of the ELF binary format of UNIX and Linux
-
Design tools for reverse engineering and binary forensic analysis
-
Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes
Book Description
Learning... |
|
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |