Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Modeling, Sensing and Control of Gas Metal Arc Welding
Modeling, Sensing and Control of Gas Metal Arc Welding
Hardbound. Arc welding is one of the key processes in industrial manufacturing, with welders using two types of processes - gas metal arc welding (GMAW) and gas tungsten arc welding (GTAW). This new book provides a survey-oriented account of the modeling, sensing, and automatic control of the GMAW process. Researchers are presented with the most...
Mastering Kali Linux for Advanced Penetration Testing
Mastering Kali Linux for Advanced Penetration Testing

A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers

About This Book

  • Conduct realistic and effective security tests on your network
  • Demonstrate how key data systems are stealthily exploited, and learn how to...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)
Software Security Engineering: A Guide for Project Managers (SEI Series in Software Engineering)

"This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the...

Virtual Inertia Synthesis and Control (Power Systems)
Virtual Inertia Synthesis and Control (Power Systems)

This book provides a thorough understanding of the basic principles, synthesis, analysis, and control of virtual inertia systems. It uses the latest technical tools to mitigate power system stability and control problems under the presence of high distributed generators (DGs) and renewable energy sources (RESs) penetration.

...
Hacking Exposed Wireless, Second Edition
Hacking Exposed Wireless, Second Edition

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily...

Google Hacking for Penetration Testers, Volume 2
Google Hacking for Penetration Testers, Volume 2
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google...
Porting to the Symbian Platform: Open Mobile Development in C/C++ (Symbian Press)
Porting to the Symbian Platform: Open Mobile Development in C/C++ (Symbian Press)
If you want to write mobile applications without the idioms of Symbian C++, have existing software assets that you'd like to re-use on Symbian devices, or are an open source developer still waiting for an open Linux-based device to gain significant market penetration, this is the book for you!

Beginning with an introduction to the native...

The Effective Incident Response Team
The Effective Incident Response Team

When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and...

CEH v9: Certified Ethical Hacker Version 9 Study Guide
CEH v9: Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam.

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,...

Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
Mobile Business Strategies: Understanding the Technologies and Opportunities (Wireless Press)
Mobile phones are no longer just a means of calling another person. In several countries, mobile devices are used to pay for merchandise, receive time sensitive information and send e-mail messages. Additionally, corporations use mobile phones to access critical business information and send tasks to field workers, regardless of time or...
unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy