Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
Active Directory Cookbook
Active Directory Cookbook

Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.

...

Black Hat Python: Python Programming for Hackers and Pentesters
Black Hat Python: Python Programming for Hackers and Pentesters

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's...

Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

An Introduction to the Finite Element Method (Engineering Series)
An Introduction to the Finite Element Method (Engineering Series)

J.N. Reddy's, An Introduction to the Finite Element Method, third edition is an update of one of the most popular FEM textbooks available. The book retains its strong conceptual approach, clearly examining the mathematical underpinnings of FEM, and providing a general approach of engineering application areas.

Known for...

Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Electrical Circuit Theory and Technology, Second Edition: Revised edition
Electrical Circuit Theory and Technology, Second Edition: Revised edition

Electrical Circuit Theory and Technology is a fully comprehensive text for courses in electrical and electronic principles, circuit theory and electrical technology. The coverage takes students from the fundamentals of the subject, to the completion of a first year degree level course. Thus, this book is ideal for students studying...

Electrical and Electronic Principles and Technology
Electrical and Electronic Principles and Technology
In this book John Bird introduces electrical principles and technology through examples rather than theory - enabling students to develop a sound understanding of the principles needed by technicians in fields such as electrical engineering, electronics and telecommunications. No previous background in engineering is assumed, making this an ideal...
Learn Active Directory Management in a Month of Lunches
Learn Active Directory Management in a Month of Lunches

Summary

Learn Active Directory Management in a Month of Lunches is a practical, hands-on tutorial designed for IT pros new to Active Directory. It skips the theory and concentrates on the day-to-day administration tasks you need to know to keep your network running smoothly. Just set aside an hour a day for...

Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy