Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
Younger Next Year: The Exercise Program: Use the Power of Exercise to Reverse Aging and Stay Strong, Fit, and Sexy
The definitive exercise book that the one-million-plus readers of the Younger Next Year® series have been waiting for—and the exercise book that takes the intimidation out of starting a workout routine. Based on the science that shows how we can turn back our biological clocks by a combination of aerobics and strength fitness,...
ARM Assembly Language Programming
ARM Assembly Language Programming
Like most interesting subjects, assembly language programming requires a little background knowledge before you can start to appreciate it. In this chapter, we explore these basics. If terms such as two's complement, hexadecimal, index register and byte are...
Network Security Foundations : Technology Fundamentals for IT Success
Network Security Foundations : Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
Sams Teach Yourself Windows XP Computer Basics All in One
Sams Teach Yourself Windows XP Computer Basics All in One

Have you ever wished you had just one book, a truly complete reference that tells you what you need to know about your new or upgraded computer? Have you wanted one that's written in plain talk, one that tells you what you need to know to get started, and one that takes you to the next level without being too techie? Have you...

Information Security Governance (Wiley Series in Systems Engineering and Management)
Information Security Governance (Wiley Series in Systems Engineering and Management)
This book provides an understanding of governance and its relevance to information security. It gives readers a clear, step-by-step approach to developing a sound security strategy aligned with their business objectives in order to ensure a predictable level of functionality and assurance. Next, it explores various approaches to implementing the...
Building Cocoa Applications : A Step by Step Guide
Building Cocoa Applications : A Step by Step Guide
Building Cocoa Applications is an ideal book for serious developers who want to write programs for the Mac OS X using Cocoa. It's a no-nonsense, hands-on text that's filled with examples -- not only simple and self-contained examples of individual Cocoa features, but extended examples of complete applications with enough sophistication...
Elastomere Friction: Theory, Experiment and Simulation
Elastomere Friction: Theory, Experiment and Simulation

Understanding elastomer friction is essential for the development of tyres, but also for sealings and other components. Thus it is of great technical importance. There are many aspects to modelling frictional processes in which an elastomer is interacting with a rough surface, ranging from theoretical formulations, leading to reduced and...

Linux+ Guide to Linux Certification
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the dynamics of the computer software industry for the next long while, just as it has for the last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers to software in which the source code is freely available to...
Business and Competitive Analysis: Effective Application of New and Classic Methods
Business and Competitive Analysis: Effective Application of New and Classic Methods

“I believe that this book will fill a great need for both full-time competitive intelligence practitioners, and those looking to add analytical skills to their managerial tool kit.”
--Bill Fiora, Partner and Founder, Outward Insights

  

Early Christian Reader
Early Christian Reader

Early Christian Reader is a sourcebook and textbook that offers a welcoming and informed entrée into the complex world of the earliest Christian literature. The books of the New Testament (NRSV) are presented in a plausible chronological order rather than the canonical order encountered in modern New Testaments. In addition,...

Expert Python Programming - Second Edition
Expert Python Programming - Second Edition

Become an ace Python programmer by learning best coding practices and advance-level concepts with Python 3.5

About This Book

  • Based on the latest stable version of Python (version 3.5)
  • Creating well manageable code that will run in various environments with different sets of...
Result Page: 255 254 253 252 251 250 249 248 247 246 245 244 243 242 241 240 239 238 237 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy