Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras
Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras

Build, scale, and deploy deep neural network models using the star libraries in Python

Key Features

  • Delve into advanced machine learning and deep learning use cases using Tensorflow and Keras
  • Build, deploy, and scale end-to-end deep neural network models in a production...
Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

sendmail, 3rd Edition
sendmail, 3rd Edition
The new edition of sendmail has been completely revised to cover sendmail 8.12--a version with more features and fundamental changes than any previous version of the Unix-based email routing program. Because the latest version of sendmail differs so significantly from earlier versions, a massive rewrite of this...
Network Security Foundations : Technology Fundamentals for IT Success
Network Security Foundations : Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Channel-Adaptive Technologies and Cross-Layer Designs for Wireless Systems with Multiple Antennas: Theory and Applications
Channel-Adaptive Technologies and Cross-Layer Designs for Wireless Systems with Multiple Antennas: Theory and Applications
Wireless communications is one of the most active areas of research over the
past and the current decades. In fact, the demand for wireless services has been
changing from the regular voice telephony services to mixed voice, data, and
multimedia services over the wireless media. Since the mid-1990s, the wireless
industry has
...
Sams Teach Yourself Windows XP Computer Basics All in One
Sams Teach Yourself Windows XP Computer Basics All in One

Have you ever wished you had just one book, a truly complete reference that tells you what you need to know about your new or upgraded computer? Have you wanted one that's written in plain talk, one that tells you what you need to know to get started, and one that takes you to the next level without being too techie? Have you...

Hardcore Windows XP
Hardcore Windows XP

A Must-Have Resource for Power Users!

Take control of Windows XP and get the most out of everything this powerful operating system has to offer. Written by Microsoft Windows XP Expert Zone columnist Joli Ballew, this book shows you hundreds of tips and tricks you’ll be able to use right away. Learn to do everything from kick...

Fedora Linux
Fedora Linux

"Neither a "Starting Linux" book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros." -- Behdad Esfahbod, Fedora developer

This book will get you up to speed quickly on Fedora...

A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness

Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...

Computational Intelligence: Engineering of Hybrid Systems
Computational Intelligence: Engineering of Hybrid Systems

Hybrid Intelligent Systems has become an important research topic in computer science and a key application field in science and engineering. This book offers a gentle introduction to the engineering aspects of hybrid intelligent systems, also emphasizing the interrelation with the main intelligent technologies such as genetic algorithms –...

unlimited object storage image
Result Page: 372 371 370 369 368 367 366 365 364 363 362 361 360 359 358 357 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy