Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed Wireless, Second Edition
Hacking Exposed Wireless, Second Edition

The latest wireless security solutions

Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily...

Google Hacking for Penetration Testers, Volume 2
Google Hacking for Penetration Testers, Volume 2
A self-respecting Google hacker spends hours trolling the Internet for juicy stuff. Firing off search after search, they thrive on the thrill of finding clean, mean, streamlined queries and get a real rush from sharing those queries and trading screenshots of their findings. I know because Ive seen it with my own eyes. As the founder of the Google...
Citrix Access Gateway VPX 5.04 Essentials
Citrix Access Gateway VPX 5.04 Essentials

A practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX

Overview

  • A complete administration companion guiding you through the complexity of providing secure remote access using the Citrix Access Gateway 5 virtual appliance.
  • Establish secure access...
Field Confirmation Testing for Suspicious Substances
Field Confirmation Testing for Suspicious Substances
Frequently a substance found at a port of entry, waste site, laboratory triage facility, or even in a hazardous materials emergency will be labeled and purportedly identified. But law enforcement and other first responders cannot take this claim at face value, as the accuracy is not confirmed and must be verified. A comprehensive handbook for...
Intelligence in Communication Systems: IFIP International Conference on Intelligence in Communication Systems, INTELLCOMM 2005, Montreal, Canada, October
Intelligence in Communication Systems: IFIP International Conference on Intelligence in Communication Systems, INTELLCOMM 2005, Montreal, Canada, October
Communication systems are now ubiquitous and making them more intelligent remains very challenging.  The IFIP International Conference on Intelligence in Communication Systems is an effort to bring together researchers and practitioners who represent the latest developments in this area.  This volume contains selected papers from the...
Software and Patents in Europe (Cambridge Intellectual Property and Information Law)
Software and Patents in Europe (Cambridge Intellectual Property and Information Law)

The computer program exclusion from Article 52 of the European Patent Convention (EPC) proved impossible to uphold as industry moved over to digital technology, and the Boards of Appeal of the European Patent Organisation (EPO) felt emboldened to circumvent the EPC in Vicom by creating the legal fiction of 'technical effect'. This...

Digital Business Security Development: Management Technologies (Premier Reference Source)
Digital Business Security Development: Management Technologies (Premier Reference Source)

Digital Business Security Development: Management Technologies provides comprehensive coverage of issues associated with maintaining business protection in digital environments. Containing state-of-the-art research relevant to informing business practice, this Premier Reference Source provides base level knowledge for managers who are not...

Self-Paced Training Kit (Exam 70-642) Configuring Windows Server 2008 Network Infrastructure (MCTS) (2nd Edition) (Microsoft Press Training Kit)
Self-Paced Training Kit (Exam 70-642) Configuring Windows Server 2008 Network Infrastructure (MCTS) (2nd Edition) (Microsoft Press Training Kit)

EXAM PREP GUIDE

Fully updated for Windows Server 2008 R2! Ace your preparation for the skills measured by Exam 70-642 - and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce and apply your knowledge to real-world case scenarios and practice
...

Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Hands-On Cybersecurity with Blockchain: Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Develop blockchain application with step-by-step instructions, working example and helpful recommendations

Key Features

  • Understanding the blockchain technology from the cybersecurity perspective
  • Developing cyber security solutions with Ethereum blockchain technology
  • ...
Modern Cryptography: Protect Your Data with Fast Block Ciphers
Modern Cryptography: Protect Your Data with Fast Block Ciphers
This book gives a general picture of modern cryptography. At the same time, it covers specific issues related to developing fast block ciphers using software and/or hardware implementation in a way that is easily understandable to a wide circle of readers. The material dedicated to the meaning of cryptography in informational society, two-key...
Electric Power Distribution Handbook (Electric Power Engineering Series)
Electric Power Distribution Handbook (Electric Power Engineering Series)
Generation, transmission, distribution. Of the "big three" components of the electricity infrastructure, distribution typically gets the least attention. Yet, its impact on reliability, quality of service, and society often make distribution the most critical element. Today, deregulation and the emergence of distributed power generation...
Windows Server 2008: The Definitive Guide
Windows Server 2008: The Definitive Guide
This practical guide has exactly what you need to work with Windows Server 2008. Inside, you'll find step-by-step procedures for using all of the major components, along with discussions on complex concepts such as Active Directory replication, DFS namespaces and replication, network access protection, the Server Core edition, Windows PowerShell,...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy