Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Wireless Security: Know It All
Wireless Security: Know It All
The latest technologies - the leading experts - proven real-world design solutions - together in one must-have volume!

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and
...
FileMaker 8 Functions and Scripts Desk Reference
FileMaker 8 Functions and Scripts Desk Reference
FileMaker 8 Functions and Scripts Desk Reference is the only book on the market expressly focused on describing each calculation formula and how and when to use each one. With this book's real-world, concrete examples of how to use each function, you will go far beyond FileMaker 8's help system. Just as a...
Sniffer Pro Network Optimization and Troubleshooting Handbook
Sniffer Pro Network Optimization and Troubleshooting Handbook
Imagine it is 4:00 P.M. and you are sitting at your desk with three books spread
across your lap.You are hard at work trying to figure out why performance on
your company’s file server has dropped sharply over the past eight hours. Of the
200 users in your company, nearly 100 of them have called to complain about
slow
...
Securing Im and P2P Applications for the Enterprise
Securing Im and P2P Applications for the Enterprise
Are You Ready for the Network Equivalent of Guerrilla Warfare?

Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of...

Kali Linux Network Scanning Cookbook - Second Edition
Kali Linux Network Scanning Cookbook - Second Edition

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated...
The Linux Process Manager
The Linux Process Manager
The book assumes that the reader has some previous knowledge of operating system
structure and terminology. For anyone needing such a background I can recommend my
book Operating Systems (O’Gorman, 2000), which is a short readable introduction to the
topic. Operating Systems with Linux (O’Gorman, 2001) is much more
...
High Performance Datacenter Networks: Architectures, Algorithms, & Opportunities (Synthesis Lectures on Computer Architecture)
High Performance Datacenter Networks: Architectures, Algorithms, & Opportunities (Synthesis Lectures on Computer Architecture)

Datacenter networks provide the communication substrate for large parallel computer systems that form the ecosystem for high performance computing (HPC) systems and modern Internet applications. The design of new datacenter networks is motivated by an array of applications ranging from communication intensive climatology, complex material...

Programming the Raspberry Pi, Second Edition: Getting Started with Python
Programming the Raspberry Pi, Second Edition: Getting Started with Python

An updated guide to programming your own Raspberry Pi projects

Learn to create inventive programs and fun games on your powerful Raspberry Pi―with no programming experience required. This practical book has been revised to fully cover the new Raspberry Pi 2, including upgrades to the Raspbian operating system. Discover...
Asymmetric Passive Components in Microwave Integrated Circuits (Wiley Series in Microwave and Optical Engineering)
Asymmetric Passive Components in Microwave Integrated Circuits (Wiley Series in Microwave and Optical Engineering)

This book examines the new and important technology of asymmetric passive components for miniaturized microwave passive circuits. The asymmetric design methods and ideas set forth by the author are groundbreaking and have not been treated in previous works. Readers discover how these design methods reduce the circuit size of microwave...

Nmap 6: Network exploration and security auditing Cookbook
Nmap 6: Network exploration and security auditing Cookbook

Want to master Nmap and its scripting engine? Then this book is for you – packed with practical tasks and precise instructions, it's a comprehensive guide to penetration testing and network monitoring. Security in depth.

Overview

  • Master the power of Nmap 6
  • Learn how the...
Learn WebAssembly: Build web applications with native performance using Wasm and C/C++
Learn WebAssembly: Build web applications with native performance using Wasm and C/C++

The first definitive guide on WebAssembly to help you break through the barriers of web development and build an entirely new class of performant applications

Key Features

  • Generate WebAssembly modules from C and C++ using Emscripten and interact with these modules in the browser
  • ...
Network Security Tools : Writing, Hacking, and Modifying Security Tools
Network Security Tools : Writing, Hacking, and Modifying Security Tools
This concise, high-end guide shows experienced administrators how to customize and extend popular open source security tools such as Nikto, Ettercap, and Nessus. It also addresses port scanners, packet injectors, network sniffers, and web assessment tools. Network Security Tools is the one resource you want at your side when locking down your...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy