Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)
Designing an IAM Framework with Oracle Identity and Access Management Suite (Oracle Press)

Excuse me, but who are you, exactly?

You are a father or mother, a son or daughter, husband or wife, a significant other, a rock climber, a kite-flyer, a bicycle enthusiast, a marathon runner, a collector of old movies, a secret novelist, a boxing fan. You are the center of your universe. On the picture collage from the...

Cryptography and Network Security
Cryptography and Network Security
The Internet, as a worldwide communication network, has changed our daily life in many ways. A new paradigm of commerce allows individuals to shop online. The World Wide Web (WWW) allows people to share information. The E-mail technology conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-...
Imaging the Cheops Pyramid (Solid Mechanics and Its Applications)
Imaging the Cheops Pyramid (Solid Mechanics and Its Applications)

In this book Egyptian Archeology  and Mathematics meet.

The author is an expert in theories and applications in Solid Mechanics and Inverse Problems, a former professor at Ecole Polytechnique and now works with Electricité de France on maintenance operations on nuclear power plants. In the Autumn of 1986, after the...

Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)
Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover...

Java EE Development with Eclipse - Second Edition
Java EE Development with Eclipse - Second Edition

Develop, debug, test, and troubleshoot Java EE 7 applications rapidly with Eclipse

About This Book

  • Go beyond simply learning Java EE APIs and explore the complete workflow of developing enterprise Java applications
  • Learn to use the features of Eclipse JEE to simplify Java EE application...
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python
Learning Python Web Penetration Testing: Automate web penetration testing activities using Python

Leverage the simplicity of Python and available libraries to build web security testing tools for your application

Key Features

  • Understand the web application penetration testing methodology and toolkit using Python
  • Write a web crawler/spider with the Scrapy library
  • ...
Easy Microsoft Works Suite 2000
Easy Microsoft Works Suite 2000
I appreciate having the opportunity to join the great team at Que in producing this book.Acquisitions Editor Angelina Ward and Development Editor Sarah Robbins provided insight and expertise as they guided this project from start to finish.And editors Karen Shields,Victoria Elzey, and Maribeth Echard ensured the clarity and accuracy of the text in...
Microsoft® Excel® 2010: Data Analysis and Business Modeling
Microsoft® Excel® 2010: Data Analysis and Business Modeling

Customer Service Note: We are sorry for the inconvenience, but the voucher with the online access code is missing from the first printing of this title. However, we do have the code, available upon request. Please contact O'Reilly Media Customer Service at mspbooksupport@oreilly.com or call 800-889-8969 to obtain your...

Learning Laravel's Eloquent
Learning Laravel's Eloquent

Develop amazing data-based applications with Eloquent, the Laravel framework ORM

About This Book

  • Build highly efficient applications with the Eloquent ORM using an expressive syntax
  • Get to grips with the power of relationships and how Eloquent handles them
  • Go beyond simple...
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite
Burp Suite Cookbook: Practical recipes to help you master web penetration testing with Burp Suite

Get hands-on experience of using Burp Suite to execute attacks and perform web assessments

Key Features

  • Use tools in Burp Suite to meet your web infrastructure security demands
  • Configure Burp to fine-tune the suite of tools specific to the target
  • Use Burp...
Ethereal Packet Sniffing
Ethereal Packet Sniffing

Ethereal offers more protocol decoding and reassembly than any free sniffer out there and ranks well among the commercial tools. You’ve all used tools like tcpdump or windump to examine individual packets, but Ethereal makes it easier to make sense of a stream of ongoing network communications. Ethereal not only makes network...

Running IPv6
Running IPv6
This is a book about running the IPv6 protocol in heterogeneous environments. It will tell
you how to enable the protocol on Windows, MacOS, FreeBSD, Linux, and Cisco routers, and,
up to a point, on Juniper routers. The intent behind the book is to present a clear view of the
aspects to IPv6 that are of interest to those who’ll
...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy