Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
LPIC Prep Kit 101 General Linux I (Exam Guide)
LPIC Prep Kit 101 General Linux I (Exam Guide)
The Linux Level I Exam Guide prepares you to pass the Linux Level I exam. The tutorial text is strictly exam-related and flows with minimal interruption, covering all necessary objectives for the exam. Study aids begin with the Chapter Opener to ready you for learning. To help you fully understand the topic, visual cues are used liberally...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Head First Python
Head First Python

Ever wished you could learn Python from a book? Head First Python is a complete learning experience for Python that helps you learn the language through a unique method that goes beyond syntax and how-to manuals, helping you understand how to be a great Python programmer. You'll quickly learn the language's...

End-to-End Quality of Service Over Heterogeneous Networks
End-to-End Quality of Service Over Heterogeneous Networks
The book presents mechanisms, protocols, and system architectures to achieve end-to-end Quality-of-Service (QoS) over heterogeneous wired/wireless networks in the Internet. Particular focus is on measurement techniques, traffic engineering mechanisms and protocols, signalling protocols as well as transport protocol extensions to support fairness...
From Russia with Code: Programming Migrations in Post-Soviet Times
From Russia with Code: Programming Migrations in Post-Soviet Times
While Russian computer scientists are notorious for their interference in the 2016 US presidential election, they are ubiquitous on Wall Street and coveted by international IT firms and often perceive themselves as the present manifestation of the past glory of Soviet scientific prowess. Drawing on over three hundred...
Succeeding with Object Databases: A Practical Look at Today's Implementations with Java and XML
Succeeding with Object Databases: A Practical Look at Today's Implementations with Java and XML
There is a definite need by many users and practitioners for documented case studies and examples that demonstrate the first-hand use of Object Data Management in realworld applications and systems. During the past few years, we have seen tremendous interest in Java. There has been an important shift from using Java just on the clientside to the...
Pro Windows PowerShell
Pro Windows PowerShell
I remember the first time I got to play with Windows PowerShell—I had some spare time on my hands, and after reading a blog post, I quickly set off to download the unofficial pre-release bits that were available at the time. I originally had very low expectations about the tool—all I wanted was a shell that is up to par with its UNIX...
Putin's World: Russia Against the West and with the Rest
Putin's World: Russia Against the West and with the Rest
From renowned foreign policy expert Angela Stent comes a dissection of how Putin created a paranoid and polarized world -- and increased Russia's status on the global stage.


How did Russia manage to emerge resurgent on the world stage and play a weak...
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation,...

Between Two Kingdoms: A Memoir of a Life Interrupted
Between Two Kingdoms: A Memoir of a Life Interrupted
NEW YORK TIMES BESTSELLER • A searing, deeply moving memoir of illness and recovery that traces one young woman’s journey from diagnosis to remission to re-entry into “normal” life—from the author of the Life, Interrupted column in The New York Times

...
unlimited object storage image
Result Page: 81 80 79 78 77 76 75 74 73 72 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy