Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Modern Particle Physics
Modern Particle Physics

Unique in its coverage of all aspects of modern particle physics, this textbook provides a clear connection between the theory and recent experimental results, including the discovery of the Higgs boson at CERN. It provides a comprehensive and self-contained description of the Standard Model of particle physics suitable for upper-level...

Building Internet Firewalls (2nd Edition)
Building Internet Firewalls (2nd Edition)
In the vast and varied universe of computer books, only a few stand out as the best in their subject areas. Building Internet Firewalls is one of those. It's deep, yet carefully focused, so that almost anything you might want to know about firewall strategies for protecting networks is here. In addition, there's lots of information on...
Beginning Expression Web (Wrox Beginning Guides)
Beginning Expression Web (Wrox Beginning Guides)
Microsoft Expression Web gives you the tools to develop sophisticated sites that integrate standardized CSS layout with ASP.NET 2.0, XML, and SQL Server™ 2005. Written by an experienced ASP.NET and Dreamweaver Web developer, this book shows you how to take advantage of all of Expression Web’s innovative features to create a memorable...
Managing Trust in Cyberspace
Managing Trust in Cyberspace

In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents. The role of trust management is to maximize trust between the parties and thereby provide a basis...

Data Structures and Algorithms with Object-Oriented Design Patterns in Java
Data Structures and Algorithms with Object-Oriented Design Patterns in Java
Create sound software designs with data structures that use modern object-oriented design patterns! Author Bruno Preiss presents the fundamentals of data structures and algorithms from a modern, object-oriented perspective. The text promotes object-oriented design using Java and illustrates the use of the latest object-oriented design patterns....
PHP for Absolute Beginners
PHP for Absolute Beginners

PHP is a server-side scripting language that enables you to develop dynamic sites that engage users in ways that are simply not possible using only HTML and CSS. PHP for Absolute Beginners takes a practical approach to teaching you how to build dynamic content for your website using PHP. You’ll quickly get started with...

Web Application Development with Yii 2 and PHP
Web Application Development with Yii 2 and PHP

Fast-track your web application development using the new generation Yii PHP framework

About This Book

  • Implement real-world web application features efficiently using the Yii development framework
  • Each chapter provides micro-examples that build upon each other to create the final...
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for...

Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend...

Security on the Web, Volume 83 (Advances in Computers)
Security on the Web, Volume 83 (Advances in Computers)

This is Volume 83 of the Advances in Computers, subtitled Security on the Web. This series, continuously published since 1960, is the oldest series covering the development of the computer industry. With the impact that the World Wide Web has on every facet of our lives today, this volume focuses on the security aspect of computing....

Metasploit Penetration Testing Cookbook, Second Edition
Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy