Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The...

Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

DNS and BIND on IPv6
DNS and BIND on IPv6

I’m sorry for writing this ebook.

Well, that’s not quite accurate. What I mean is, I’m sorry I didn’t have time to update DNS and BIND to include all this new IPv6 material. DNS and BIND deserves a sixth edition, but I’m afraid my schedule is so hectic right now that I just don’t have time to...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)
20 Minutes to a Top Performer: Three Fast and Effective Conversations to Motivate, Develop, and Engage Your Employees (Business Books)

Transform Average Employees into Powerhouse Performers

“I cannot think of a more important message and timely book. 20 Minutes to a Top Performer offers quick, simple techniques for managers to improve their effectiveness in communicating with their teams.”
Steven Fine, vice president for
...

Mastering Nginx
Mastering Nginx

Written for experienced systems administrators and engineers, this book teaches you from scratch how to configure Nginx for any situation. Step-by-step instructions and real-world code snippets clarify even the most complex areas.

Overview

  • An in-depth configuration guide to help you understand how to best...
Nginx HTTP Server - Second Edition
Nginx HTTP Server - Second Edition

Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache,...

Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Identifying Malicious Code Through Reverse Engineering (Advances in Information Security)
Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. These attacks result in a loss of millions of dollars to businesses across the world.

Identifying Malicious Code through Reverse Engineering provides information on reverse engineering and concepts that can be used to...

Mind Design II: Philosophy, Psychology, and Artificial Intelligence
Mind Design II: Philosophy, Psychology, and Artificial Intelligence
"Ming Design II is a welcome update of its predecessor, itself a useful compendium on the philosophy of cognitive science. This new volume retains the intellectual foundations, and some discussions of classical AI built on them, while adding connectionism, situated AI, and dynamic systems theory as extra storeys. Which of these is...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Writing and Querying MapReduce Views in CouchDB
Writing and Querying MapReduce Views in CouchDB

If you are reading this book, then you likely have already installed CouchDB, explored the Futon web administration console, and created a few documents using the cURL command-line tool. You may even have created a CouchApp or other type of application that accesses documents stored in a CouchDB database. However, to use CouchDB for...

Result Page: 13 12 11 10 9 8 7 6 5 4 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy