Home | Amazing | Today | Tags | Publishers | Years | Search 
Understanding Network Hacks: Attack and Defense with Python
Understanding Network Hacks: Attack and Defense with Python

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore...

Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)
Secure Wireless Sensor Networks: Threats and Solutions (Advances in Information Security)

This book explores five fundamental mechanisms to build secure Wireless Sensor Networks (WSNs). It presents security issues related to a single node which deals with the authentication and communication confidentiality with other nodes. It also focuses on network security, providing solutions for the node capture attack and the clone...

Basic Guide to System Safety
Basic Guide to System Safety

This book provides guidance on including prevention through design concepts within an occupational safety and health management system. Through the application of these concepts, decisions pertaining to occupational hazards and risks can be incorporated into the process of design and redesign of work premises, tools, equipment, machinery,...

The Handbook of Homicide (Wiley Handbooks in Criminology and Criminal Justice)
The Handbook of Homicide (Wiley Handbooks in Criminology and Criminal Justice)

The Handbook of Homicide presents a series of original essays by renowned authors from around the world, reflecting the latest scholarship on the nature, causes, and patterns of homicide, as well as policies and practices for its investigation and prevention.

  • Includes comprehensive coverage of the complex phenomenon...
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Beginning Backup and Restore for SQL Server: Data Loss Management and Prevention Techniques
Beginning Backup and Restore for SQL Server: Data Loss Management and Prevention Techniques
As database administrators, our primary duty is to protect the data in the databases we are responsible for. This data represents the heart and soul of the company employing us, and could destroy a business if not maintained properly. In this context, the proper application of a sound backup and restore solution is absolutely...
Home Blood Pressure Monitoring (Updates in Hypertension and Cardiovascular Protection)
Home Blood Pressure Monitoring (Updates in Hypertension and Cardiovascular Protection)

Hypertension remains a leading cause of disability and death worldwide. Self-monitoring of blood pressure by patients at home is currently recommended as a valuable tool for the diagnosis and management of hypertension. Unfortunately, in clinical practice, home blood pressure monitoring is often inadequately implemented, mostly due...

Oculoplastic Surgery
Oculoplastic Surgery

The definitive resource on reconstructive and aesthetic oculofacial surgery

Oculoplastic Surgery, Third Edition, by Brian Leatherbarrow, reflects more than 25 years of experience and multidisciplinary collaboration in treating patients with a wide spectrum of oculoplastic, orbital,...

Human Geoscience (Advances in Geological Science)
Human Geoscience (Advances in Geological Science)
This book is a product of the joint efforts of interdisciplinary academic fields under the integrative framework of human geoscience. Human geoscience is a new genre of geoscience concerned with the natural phenomena that occur on the surface of the Earth and their relations with human activities. It therefore has connections with many...
Oxidative Stress in Lung Diseases: Volume 2
Oxidative Stress in Lung Diseases: Volume 2

This is the second volume of the comprehensive, two-volume work on oxidative stress in lung diseases. Adopting a multidisciplinary approach, it demonstrates the cellular and molecular mechanisms associated with ROS (reactive oxygen species)-induced initiation and progression of a variety of lung diseases, such as COPD, emphysema,...

HIV Transmission: Statistical Modelling
HIV Transmission: Statistical Modelling
This book presents models describing HIV transmission rates at population level, discussing the main statistical methods and analytical interventions. It also assesses the practical applicability of the various modelling techniques, offering readers insights into what methods are available and, more importantly, when they should be used to...
Percutaneous Coronary Interventions for Chronic Total Occlusion: A Guide to Success
Percutaneous Coronary Interventions for Chronic Total Occlusion: A Guide to Success
This book equips readers with the knowledge required in order to successfully treat coronary chronic total occlusion by means of percutaneous coronary interventions. All the essential background knowledge is provided, including with regard to procedurally relevant histopathology, assessment of chronic total occlusion by means of angiography and...
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy