Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets
"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious...
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
The Professional Scrum Master's Handbook (Professional Expertise Distilled)
The Professional Scrum Master's Handbook (Professional Expertise Distilled)

Key Features

  • Checklists, questions, and exercises to get you thinking (and acting) like a professional ScrumMaster
  • Presented in a relaxed, jargon-free, personable style
  • Full of ideas, tips, and anecdotes based on real-world experiences

Book Description

A...

Python Hacking Essentials
Python Hacking Essentials

Target Audience

  • This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I...
Circuit Systems with MATLAB and PSpice
Circuit Systems with MATLAB and PSpice
Software tools applied to circuit analysis and design are rapidly evolving, enabling students to move beyond the time-consuming, math-intensive methods of traditional circuit instruction. By incorporating MATLAB 7.0 and PSpice 10.0, alongside systematic use of the Laplace transform, Yang and Lee help readers rapidly gain an intuitive...
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
Sockets, Shellcode, Porting, and Coding : Reverse Engineering Exploits and Tool Coding for Security Professionals
In this groundbreaking book, best-selling author James C. Foster reveals for the first time the methods hackers use to attack and exploit the core components of operating systems and their applications. He provides working code and scripts in C/C++, Java, Perl, and NASL to detect and defend against the most dangerous attacks. The book covers in...
Excel by Example: A Microsoft Excel Cookbook for Electronics Engineers
Excel by Example: A Microsoft Excel Cookbook for Electronics Engineers
The spreadsheet has become a ubiquitous engineering tool, and Microsoft Excel is the standard spreadsheet software package. Over the years, Excel has become such a complex program that most engineers understand and use only a tiny part of its power and features. This book is aimed at electronics engineers and technicians in particular, showing them...
Programming the Raspberry Pi: Getting Started with Python
Programming the Raspberry Pi: Getting Started with Python

Program your own Raspberry Pi projects

Create innovative programs and fun games on your tiny yet powerful Raspberry Pi. In this book, electronics guru Simon Monk explains the basics of Raspberry Pi application development, while providing hands-on examples and ready-to-use scripts. See how to set up hardware and...

Control of Interactive Robotic Interfaces: A Port-Hamiltonian Approach (Springer Tracts in Advanced Robotics, no. 29)
Control of Interactive Robotic Interfaces: A Port-Hamiltonian Approach (Springer Tracts in Advanced Robotics, no. 29)
From the reviews:

"This book deals with the important problem of modeling and controlling the interaction between two physical systems—from one side the robot and from the other side its environment. … It is a suitable tool to formally model physical systems based on the energy concept and its relations. The authors introduce...

802.1X Port-Based Authentication
802.1X Port-Based Authentication
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of...
Building an FPS Game with Unity
Building an FPS Game with Unity

Create a high-quality first person shooter game using the Unity game engine and the popular UFPS and Probuilder frameworks

About This Book

  • Learn how to use Unity in conjunction with UFPS and ProBuilder to create a high-quality game quickly
  • Create both interior and exterior...
Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games: Understanding and Engineering Multiplayer Internet Games
Networking and Online Games concisely draws together and illustrates the overlapping and interacting technical concerns of these sectors. The text explains the principles behind modern multiplayer communication systems and the techniques underlying contemporary networked games. The traffic patterns that modern games impose on networks, and...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy