 |
|
 Mastering Kali Linux for Advanced Penetration Testing
A practical guide to testing your network's security with Kali Linux - the preferred choice of penetration testers and hackers
About This Book
-
Conduct realistic and effective security tests on your network
-
Demonstrate how key data systems are stealthily exploited, and learn how to...
|  |  Disruptive Possibilities: How Big Data Changes Everything
Big data has more disruptive potential than any information technology developed in the past 40 years. As author Jeffrey Needham points out in this revealing book, big data can provide unprecedented visibility into the operational efficiency of enterprises and agencies.
Disruptive Possibilities provides an... |  |  Webinars For Dummies
Gather an audience from around the globe with webinars
Webinars For Dummies takes the guesswork and uncertaintyout of webinar creation. Written by John Carucci under the guidanceof webinar technology company ON24, the book provides a roadmap forcreating a webinar that effectively communicates to the audiencewithout... |
|
|
|
 Dilemmas Of International Trade: Second Edition (Dilemmas in World Politics)
In the post-Cold War world, trade is the new arena for competition-between nations, between groups, between ethical and theoretical ideas. In this revised and updated second edition of Dilemmas of International Trade political economist Bruce Moon puts contemporary trade events--NAFTA, United States-Japan controversies, the Uruguay ... |  |  Python: Master the Art of Design Patterns
About This Book
-
Learn all about abstract design patterns and how to implement them in Python 3
-
Understand the structural, creational, and behavioral Python design patterns
-
Get to know the context and application of design patterns to solve real-world problems in software...
|  |  Cloud Computing and Virtualization
The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of... |
|
| Result Page: 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 |