Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues
Mastering Python for Networking and Security: Leverage Python scripts and libraries to overcome networking and security issues

Master Python scripting to build a network and perform security operations

Key Features

  • Learn to handle cyber attacks with modern Python scripting
  • Discover various Python libraries for building and securing your network
  • Understand Python packages and...
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
PostGIS Cookbook - Second Edition: Store, organize, manipulate, and analyze spatial data
PostGIS Cookbook - Second Edition: Store, organize, manipulate, and analyze spatial data

Create and manage spatial data with PostGIS

Key Features

  • Import and export geographic data from the PostGIS database using the available tools
  • Maintain, optimize, and fine-tune spatial data for long-term viability
  • Utilize the parallel support functionality...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Be online without leaving a trace.

Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book,
...
Data Protection
Data Protection

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data...

IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful...
Electric Power Distribution Handbook (Electric Power Engineering Series)
Electric Power Distribution Handbook (Electric Power Engineering Series)
Generation, transmission, distribution. Of the "big three" components of the electricity infrastructure, distribution typically gets the least attention. Yet, its impact on reliability, quality of service, and society often make distribution the most critical element. Today, deregulation and the emergence of distributed power generation...
Microsoft Outlook 2010 Inside Out
Microsoft Outlook 2010 Inside Out

You're beyond the basics, so dive right in and take control of your schedule and business communications from the inside out! This in-depth reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds in a supremely organized format. It's all muscle and no fluff. Discover how the experts manage...

Steal This Computer Book 3: What They Won't Tell You About the Internet
Steal This Computer Book 3: What They Won't Tell You About the Internet
This offbeat, non-technical book looks at what hackers do, how they do it, and how you can protect yourself. This edition also covers rootkits, spyware, web bugs, identity theft, hacktivism, wireless hacking (wardriving), biometrics, and firewalls.

WARNING: This book is not to be used for hacking into government computers, shutting...

Result Page: 45 44 43 42 41 40 39 38 37 36 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy