Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Kali Linux Network Scanning Cookbook
Kali Linux Network Scanning Cookbook

Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated into the Kali...
Kali Linux Network Scanning Cookbook - Second Edition
Kali Linux Network Scanning Cookbook - Second Edition

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated...
HackNotes(tm) Network Security Portable Reference
HackNotes(tm) Network Security Portable Reference

HackNotes Network Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques being used by hackers and criminals today to break into computer networks. Understand how the attacks work, then learn how to assess and strengthen your systems through a series of tested and trusted...

Cloud Native Architectures: Design high-availability and cost-effective applications for the cloud
Cloud Native Architectures: Design high-availability and cost-effective applications for the cloud

Learn and understand the need to architect cloud applications and migrate your business to cloud efficiently

Key Features

  • Understand the core design elements required to build scalable systems
  • Plan resources and technology stacks effectively for high security and fault...
PowerShell Deep Dives
PowerShell Deep Dives

Summary

Here's your chance to learn from the best in the business. PowerShell Deep Dives is a trove of essential techniques, practical guidance, and the expert insights you earn only through years of experience. Editors Jeffery Hicks, Richard Siddaway, Oisin Grehan, and Aleksandar Nikolic hand-picked...

Java Design Patterns: A Hands-On Experience with Real-World Examples
Java Design Patterns: A Hands-On Experience with Real-World Examples

Get hands-on experience implementing 26 of the most common design patterns using Java and Eclipse. In addition to Gang of Four (GoF) design patterns, you will also learn about alternative design patterns, and understand the criticisms of design patterns with an overview of anti-patterns. For each pattern you will see at least...

The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
Circuit Systems with MATLAB and PSpice
Circuit Systems with MATLAB and PSpice
Software tools applied to circuit analysis and design are rapidly evolving, enabling students to move beyond the time-consuming, math-intensive methods of traditional circuit instruction. By incorporating MATLAB 7.0 and PSpice 10.0, alongside systematic use of the Laplace transform, Yang and Lee help readers rapidly gain an intuitive...
IBM DB2 9.7 Advanced Application Developer Cookbook
IBM DB2 9.7 Advanced Application Developer Cookbook
Welcome to the DB2 9.7 Advanced Application Developer Cookbook. DB2 9.7 is a truly incredible database product from IBM, which offers an excellent mix of application performance, reliability, and ease of development enablement. In this cookbook, you can find both: hands-on and real world practical application development examples, as well...
Serosal Membranes (Pleura, Pericardium, Peritoneum): Normal Structure, Development and Experimental Pathology (Advances in Anatomy, Embryology and Cell Biology)
Serosal Membranes (Pleura, Pericardium, Peritoneum): Normal Structure, Development and Experimental Pathology (Advances in Anatomy, Embryology and Cell Biology)

in the human visceral pleura is the sole reliable criterion for the statement that it belongs to the ‘thick type’, while all observed animals have a ‘thin’ type VP. The mesothelium and underlying structures of the SM represent a highly permeable bidirectional membrane with signi?cant differences in the organ and region...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

unlimited object storage image
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy