Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Kali Linux: Wireless Penetration Testing Beginner's Guide
Kali Linux: Wireless Penetration Testing Beginner's Guide

Key Features

  • Learn wireless penetration testing with Kali Linux, the latest iteration of Backtrack
  • Detect hidden wireless networks and discover their names
  • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing
  • Develop your encryption...
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Practical Azure Application Development: A Step-by-Step Approach to Build Feature-Rich Cloud-Ready Solutions
Practical Azure Application Development: A Step-by-Step Approach to Build Feature-Rich Cloud-Ready Solutions
Get started and learn a step-by-step approach to application development using Microsoft Azure. Select the right services to solve the problem at hand in a cost-effective manner and explore the potential different services and how they can help in building enterprise applications.

Azure has an ample amount of
...
Variable-length Codes for Data Compression
Variable-length Codes for Data Compression
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there are a large number of less-known codes that have useful properties - such as those containing certain bit patterns, or those that are robust - and these can be useful. This book brings this large set of codes to the attention of...
Wireless Sensor Networks: Technology, Protocols, and Applications
Wireless Sensor Networks: Technology, Protocols, and Applications
Infrastructure for Homeland Security Environments

Wireless Sensor Networks helps readers discover the emerging field of low-cost standards-based sensors that promise a high order of spatial and temporal resolution and accuracy in an ever-increasing universe of applications. It shares the latest advances in science and engineering paving the way...

Electricity for the Entertainment Electrician & Technician
Electricity for the Entertainment Electrician & Technician
No more sifting through general electrical guides -- this reference is specific to entertainment!

Electricity for the Entertainment Electrician and Technician will reinforce the fundamentals of electricity and explain the principles of power distribution, important safety issues, and discuss techniques and practices around
...
The Employee Answer Book: Practical Answers to the Top 250 Questions Every Employee Has
The Employee Answer Book: Practical Answers to the Top 250 Questions Every Employee Has

Not everything that you might think is unfair in the workplace is actually illegal.

In order to fully protect your rights, you must understand them first. The Employee Answer Book, the latest addition to the Answer Book Series, answers real questions from real people. This book discusses federal employment law in detail and touches...

EMI Protection for Communication Systems
EMI Protection for Communication Systems

In recent years, the protection of communication services operating in the same of adjacent channels has become more and more challenging. Communication systems need to be protected from natural and man-made interference. This practical reference provides a through understanding of how to protect communication systems from intentional and...

Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

It is a great pleasure for me to write this foreword about a book that comes out of one of the first research projects funded by ANR, the French National Research Agency. ANR was established by the French government in 2005 to fund research projects, based on competitive schemes giving researchers the best opportunities to realize...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Result Page: 44 43 42 41 40 39 38 37 36 35 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy