Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

CoreOS in Action: Running Applications on Container Linux
CoreOS in Action: Running Applications on Container Linux

Summary

CoreOS in Action is a clear tutorial for deploying container-based systems on CoreOS Container Linux.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

Traditional Linux...

TCP/IP Protocol Suite (Mcgraw-hill Forouzan Networking)
TCP/IP Protocol Suite (Mcgraw-hill Forouzan Networking)

In a world where the number of people who need to learn about data communications and networking is exploding, Forouzan's book is the answer. The book's visual approach makes it easy for students to learn about and understand the concepts involved in this rapidly developing field.

TCP/IP Protocol Suite teaches students and...

Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)
Dark Web: Exploring and Data Mining the Dark Side of the Web (Integrated Series in Information Systems)

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...

AWS Certified Advanced Networking Official Study Guide: Specialty Exam
AWS Certified Advanced Networking Official Study Guide: Specialty Exam

The official study guide for the AWS certification specialty exam

The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,...

Docker Bootcamp
Docker Bootcamp

Fast, intensive, and effective Docker learning

About This Book

  • Get well-versed with Docker in 7 days
  • Identify and resolve common problems faced by users while working with Docker
  • A fast-paced guide that will focus on all the core Docker functionalities

...

Dictionary of Computer and Internet Terms (Words R Us Computer Dictionaries) (Volume 1)
Dictionary of Computer and Internet Terms (Words R Us Computer Dictionaries) (Volume 1)

This dictionary contains over 32,000 terms that are specific to Computers and the Internet. Each term includes a definition / description. With more than 750 pages, this dictionary is one of the most comprehensive resources available. Terms relate to applications, commands, functions, operating systems, image processing and networking. No...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

MCSA Guide to Microsoft SQL Server 2012 (Exam 70-462) (Networking (Course Technology)): (Exam 70-462)
MCSA Guide to Microsoft SQL Server 2012 (Exam 70-462) (Networking (Course Technology)): (Exam 70-462)

MCSA GUIDE TO MICROSOFT SQL SERVER 2012 (Exam #70-462) provides a thorough introduction to essential database administration principles and practices to prepare readers for certification and career success. Ideal for formal courses, self-study, or professional reference, this detailed text employs a lab-based approach to help users develop...

Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)
Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)

Now diffused among end-user devices in mobile and wireline networks, the "cloud" is becoming the "fog." This book focuses on the challenges and solutions related to cloud and fog computing for 5G mobile networks and presents novel approaches to the frameworks and schemes that carry out storage, communication, computation,...

Result Page: 181 180 179 178 177 176 175 174 173 172 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy