 |
|
|
|
 Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open... |  |  Computer Science Illuminated
Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
Fully revised and updated, the Sixth Edition of the best-selling text Computer Science... |  |  Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.
... |
|
 |  |  Perl 5 by Example
With thousands of sites popping up on the Internet each week, this is the perfect time to stock up on beginning-level books for Internet programming! Readers will learn how to handle CGI and Internet programming!... |  |  |
|
| Result Page: 11 10 9 8 7 6 5 4 3 2 1 |