Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Nickel and the Skin: Absorption, Immunology, Epidemiology, and Metallurgy (Dermatology: Clinical & Basic Science)
Nickel and the Skin: Absorption, Immunology, Epidemiology, and Metallurgy (Dermatology: Clinical & Basic Science)
From the viewpoint of immunotoxicology, hazards associated with nickel primarily derive from its type-IV immunogenic properties, as it consistently ranks as the premier anthropogenic allergen among the general population in industrialized countries. Thus, immunology of nickel represents the major part of reviews addressing...
Security+ Study Guide
Security+ Study Guide
Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study Guides

The Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test
...
Penetration Testing and Network Defense (Cisco Press Networking Technology)
Penetration Testing and Network Defense (Cisco Press Networking Technology)

The practical guide to assessing network vulnerabilities andmanaging security risk.

  • Assess your network's defensive strengths and eliminatevulnerabilities with proven internal testing methodologies

  • Learn how to perform simulated attacks...

Web Based Energy Information and Control Systems
Web Based Energy Information and Control Systems
Advances in equipment, processes, and technology are the driving forces in energy management, energy efficiency, and energy cost control improvements. Web Based Energy Information & Control Systems documents the operational experience with Web-based systems within facilities and varied applications and shows the new opportunities for energy and...
Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman
...

Mastering Nmap Scripting Engine
Mastering Nmap Scripting Engine

Master the Nmap Scripting Engine and the art of developing NSE scripts

About This Book

  • Extend the capabilities of Nmap to perform custom tasks with the Nmap Scripting Engine
  • Learn the fundamentals of Lua programming
  • Develop powerful scripts for the Nmap Scripting...
HTML5 Enterprise Application Development
HTML5 Enterprise Application Development

For developers who want to build enterprise web applications using HTML5, CSS3, JavaScript, and external XPIs, this tutorial is all you need. Structured around the creation of a real application, it's practical and easily assimilated.

Overview

  • Learn the most useful HTML5 features by developing a...
Kali Linux CTF Blueprints
Kali Linux CTF Blueprints

Build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux

About This Book

  • Put the skills of the experts to the test with these tough and customisable pentesting projects
  • Develop each challenge to suit your specific...
Core and Metro Networks
Core and Metro Networks

It is commonly accepted today that optical fiber communications have revolutionized telecommunications. Indeed, dramatic changes have been induced in the way we interact with our relatives, friends, and colleagues: we retrieve information, we entertain and educate ourselves, we buy and sell, we organize our activities, and so on, in a long...

Kali Linux Wireless Penetration Testing Essentials
Kali Linux Wireless Penetration Testing Essentials

Plan and execute penetration tests on wireless networks with the Kali Linux distribution

About This Book

  • Learn the fundamentals of wireless LAN security and penetration testing
  • Discover and attack wireless networks using specialized Kali Linux tools
  • A step-by-step,...
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing
Learn Ethical Hacking from Scratch: Your stepping stone to penetration testing

Learn how to hack systems like black hat hackers and secure them like security experts

Key Features

  • Understand how computer systems work and their vulnerabilities
  • Exploit weaknesses and hack into machines to test their security
  • Learn how to secure systems...
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Python is a hacker's language. With its decreasejd complexity, increased efficiency, limitless third-party libraries, and low bar to entry, Python provides an excellent development platform to build your own offensive tools. If you are running Mac OS X or Linux, odds are it is already installed on your system. While a wealth of offensive...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy