Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Kinematic Analysis of Robot Manipulators
Kinematic Analysis of Robot Manipulators

This text provides a first-level understanding of the structure, mobility, and analysis of serial manipulators. A serial manipulator is an unclosed or open movable polygon consisting of a series of links and joints. One end is fixed to ground, and attached to the open end is a hand or end effector that can move freely in space.

The...

Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Nginx HTTP Server - Second Edition
Nginx HTTP Server - Second Edition

Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache,...

Inflammation, Advancing Age and Nutrition: Research and Clinical Interventions
Inflammation, Advancing Age and Nutrition: Research and Clinical Interventions

The book provides a comprehensive overview to understanding the integrated impact of the concepts of cellular and molecular aspects, models, environmental factors, and lifestyle involved in premature aging. Additionally, it examines how functional food, dietary nutraceuticals or pharmacological compounds can reverse inflammation and premature...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering
Sometimes, the best way to advance is in reverse

If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so you can target...

Designing Large Scale LANs
Designing Large Scale LANs
Large networks are complex systems, with many interdependent devices held together only by the strength of the network designer's specifications. It takes a lot of knowledge--and a lot of time--to make sure that the capacity of links and nodes is neither wasted nor overloaded. Designing Large-Scale LANs explains how the pieces of a large...
Intellectual Property and Open Source: A Practical Guide to Protecting Code
Intellectual Property and Open Source: A Practical Guide to Protecting Code
"Clear, correct, and deep, this is a welcome addition to discussions of law and computing for anyone -- even lawyers!" -- Lawrence Lessig, Professor of Law at Stanford Law School and founder of the Stanford Center for Internet and Society

If you work in information technology, intellectual property is central to your job -- but...

The Data Model Resource Book, Vol. 1: A Library of Universal Data Models for All Enterprises
The Data Model Resource Book, Vol. 1: A Library of Universal Data Models for All Enterprises
"These books are a must for any company implementing data models. They contain practical insights and templates of universal data models which can be used by all enterprises, regardless of their level of experience."–Ron Powell, Publisher, DM Review

Industry experts raved about The Data Model Resource Book when it first came...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Result Page: 13 12 11 10 9 8 7 6 5 4 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy