Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...

Bash it Out!: Strengthen your Bash knowledge with 17 scripting challenges of varied difficulties
Bash it Out!: Strengthen your Bash knowledge with 17 scripting challenges of varied difficulties

Do you want to improve your Bash skills? Be aware of the common or not-so-common pitfalls of interactive Bash usage? Or simply test your friends (and/or your employees!) with subtle brainteasers? Then, this book is for you! The goal of the book is to let you discover a thing or two about the Bash and Linux/Unix command line by solving...

Programming and Problem Solving With C++, Third Edition
Programming and Problem Solving With C++, Third Edition

This book continues to reflect our experience that topics once considered too advanced can be taught in the first course. The text addresses metalanguages explicitly as the formal means of specifying programming language syntax.

...
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)
The Art of Computer Programming: Volume 3: Sorting and Searching (2nd Edition)

The bible of all fundamental algorithms and the work that taught many of today's software developers most of what they know about computer programming.

 

Byte, September 1995

 

...
DSP for MATLAB and LabVIEW III: Digital Filter Design (Synthesis Lectures on Signal Processing)
DSP for MATLAB and LabVIEW III: Digital Filter Design (Synthesis Lectures on Signal Processing)

This book is Volume III of the series DSP for MATLAB™ and LabVIEW™. Volume III covers digital filter design, including the specific topics of FIR design via windowed-ideal-lowpass filter, FIR highpass, bandpass, and bandstop filter design from windowed-ideal lowpass filters, FIR design using the transition-band-optimized Frequency...

802.11 WLANs and IP Networking: Security, QoS, and Mobility
802.11 WLANs and IP Networking: Security, QoS, and Mobility
Even after all the earthly riches are enjoyed there still remains in the heart a
longing for knowledge, true knowledge. It is this longing and the desire to bring
the knowledge to others that resulted in the revelation of this book.

“How do IEEE 802.11 wireless local area networks (WLANs) work together
with the
...
java interview questions: Top 20 java interview programs and answers
java interview questions: Top 20 java interview programs and answers

Java Interview Question is here to help you through the INTERVIEW process, teaching you what you need to know and enabling you to perform at your very best. I've coached and interviewed hundreds of software engineers. The result is this book. These interview questions are real; they are not pulled out of computer science textbooks. They...

Systems Bioinformatics: An Engineering Case-Based Approach
Systems Bioinformatics: An Engineering Case-Based Approach
The high-throughput nature of bioinformatics and system biology has made traditional biological methods, which tend to focus one or two molecules at a time, obsolete. It has made engineering and problem solving skills essential to attack the resulting complex, multiscale problems. Certain technologies, such as robotics automation, microfabrication,...
Biomedical Image Analysis: Tracking (Synthesis Lectures on Image, Video, & Multimedia Processing)
Biomedical Image Analysis: Tracking (Synthesis Lectures on Image, Video, & Multimedia Processing)
In biological and medical imaging applications, tracking objects in motion is a critical task. This book describes the state-of-the-art in biomedical tracking techniques. We begin by detailing methods for tracking using active contours, which have been highly successful in biomedical applications. The book next covers the major probabilistic...
Digital Currency: An International Legal and Regulatory Compliance Guide
Digital Currency: An International Legal and Regulatory Compliance Guide

Digital or ‘virtual’ currencies pose significant challenges for government, financial and legal institutions because of their non-physical nature and their relative anonymity to physical currency. These attributes make this form of exchange extremely volatile and, at the same time, attractive to criminals. Many countries around...

The Requirements Engineering Handbook (Artech House Technology Management and Professional Development Library)
The Requirements Engineering Handbook (Artech House Technology Management and Professional Development Library)
This book is intended as a concise but thorough ready reference for requirements
analysts (RAs)—those who are assigned to determine the requirements
for planned systems and software, both in computing and engineering.
It is a desk guide/handbook that focuses on how RAs can best perform their
work.

The
...
Result Page: 64 63 62 61 60 59 58 57 56 55 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy