Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)

Learn, prepare, and practice for CCNA Cyber Ops SECOPS #210-255 exam success with this Official Cert Guide from Pearson IT Certification, a leader in IT Certification learning.

  • Master CCNA Cyber Ops SECOPS #210-255 exam topics
Your UNIX/Linux: The Ultimate Guide
Your UNIX/Linux: The Ultimate Guide

Your UNIX/Linux: The Ultimate Guide, written with both users and programmers in mind, is the ultimate UNIX/Linux text. Both pedagogical tool and exhaustive reference, it is well-suited to any course that includes UNIX or Linux. A strong pedagogical framework sets it apart from similar texts and allows beginning students to gain a firm grasp...

C Programming - An Advanced Course
C Programming - An Advanced Course

This book takes up where C Programming - A Beginner's Course leaves off. It assumes you have a working knowledge of basic programming concepts such as variables, constants, assignment, selection (if..else) and looping (while, for). It also assumes you are comfortable with writing functions and working with arrays. If you are not, it is...

Professional Financial Computing Using Excel and VBA
Professional Financial Computing Using Excel and VBA

"Professional Financial Computing Using Excel and VBA is an admirable exposition that bridges the theoretical underpinnings of financial engineering and its application which usually appears as a "black-box" software application. The book opens the black-box and reveals the architecture of risk-modeling and financial...

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...

TCP/IP Protocol Suite (Mcgraw-hill Forouzan Networking)
TCP/IP Protocol Suite (Mcgraw-hill Forouzan Networking)

In a world where the number of people who need to learn about data communications and networking is exploding, Forouzan's book is the answer. The book's visual approach makes it easy for students to learn about and understand the concepts involved in this rapidly developing field.

TCP/IP Protocol Suite teaches students and...

Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

The Practical Handbook of Genetic Algorithms: Applications, Second Edition
The Practical Handbook of Genetic Algorithms: Applications, Second Edition

Rapid developments in the field of genetic algorithms along with the popularity of the first edition precipitated this completely revised, thoroughly updated second edition of The Practical Handbook of Genetic Algorithms. Like its predecessor, this edition helps practitioners stay up to date on recent developments in the field and provides...

Numerical and Analytical Methods for Scientists and Engineers, Using Mathematica
Numerical and Analytical Methods for Scientists and Engineers, Using Mathematica
Up to this point in your career you have been asked to use mathematics to solve rather elementary problems in the physical sciences. However, when you graduate and become a working scientist or engineer you will often be confronted with complex real-world problems. Understanding the material in this book is a first step toward...
Game Programming All in One
Game Programming All in One

Create your own high-caliber games with some of the same tools used by professional game developers! If you have a working knowledge of C or C++, then "Game Programming All in One, 2nd Edition" can get you started on your journey. It uses hands-on projects to explain each new subject and includes many sample programs to reinforce...

Database System Concepts
Database System Concepts

Database System Concepts by Silberschatz, Korth and Sudarshan is now in its 6th edition and is one of the cornerstone texts of database education. It presents the fundamental concepts of database management in an intuitive manner geared toward allowing students to begin working with databases as quickly as possible.

The text...

Result Page: 268 267 266 265 264 263 262 261 260 259 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy