Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Modelling Enterprise Architectures (Iet Professional Applications of Computing Series)
Modelling Enterprise Architectures (Iet Professional Applications of Computing Series)

The world of business and commerce is changing. As technology advances at a rate of knots and the geography of global working becomes less and less relevant, so the need to run an effective business becomes more and more important. Businesses grow at an alarming rate, often overnight. Interest in particular field can explode resulting...

Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python
Python for Offensive PenTest: A practical guide to ethical hacking and penetration testing using Python

Your one-stop guide to using Python, creating your own hacking tools, and making the most out of resources available for this programming language

Key Features

  • Comprehensive information on building a web application penetration testing framework using Python
  • Master web...
Practical DWR 2 Projects (Expert's Voice in Java)
Practical DWR 2 Projects (Expert's Voice in Java)

The Ajax craze is sweeping the world, and there is no shortage of libraries from which to choose to make it all easier to develop. One of those libraries has risen near the top in the Java space, and that library is DWR. DWR, or Direct Web Remoting, allows you to treat your Java classes running on the server as if they were local objects running...

Information Security: Principles and Practice
Information Security: Principles and Practice

Now updated—your expert guide to twenty-first century information security

Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data....

Oracle GoldenGate 12c Implementer's Guide
Oracle GoldenGate 12c Implementer's Guide

Leverage the power of real-time data access for designing, building, and tuning your GoldenGate Enterprise

About This Book

  • Orchestrate the rich features of GoldenGate 12c and exploit the performance-enhancing features and manageability in your Enterprise environment
  • Master data...
Reverse Engineering of Object Oriented Code (Monographs in Computer Science)
Reverse Engineering of Object Oriented Code (Monographs in Computer Science)
Reverse engineering aims at supporting program comprehension, by exploiting
the source code as the major source of information about the organization
and behavior of a program, and by extracting a set of potentially useful views
provided to programmers in the form of diagrams. Alternative perspectives
can be adopted when the
...
Encyclopedia of Urban Legends
Encyclopedia of Urban Legends

Any folklorist who saw the 1998 Columbia Pictures film Urban Legend will probably remember the library scene for its depiction of one aspect of folklore research. In this scene the beautiful student Natalie (played by Alicia Witt) suspects that recent campus mayhem was inspired by urban legends, the same kind of stories...

Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and systems

Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed by the NSA project

Key Features

  • Make the most of Ghidra on different platforms such as Linux, Windows, and macOS
  • Leverage a variety of...
Hand transplantation
Hand transplantation
The story of this book is quite simple: after the first few hand transplants, we felt the need to have regular meetings so that our clinical experiences would be beneficially shared and serve as a basis to draw some guidelines for the future. In so doing, we soon realised that a huge amount of original clinical data and...
Visual Modeling with Rational Rose 2002 and UML (3rd Edition)
Visual Modeling with Rational Rose 2002 and UML (3rd Edition)

Within the space of just a few years, the Unified Modeling Language (UML) has emerged as the design medium of choice for developing large-scale distributed object applications. The UML's standard semantics and notation for describing object structure and behavior make it particularly well suited to this function. Augmented by...

Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself. Unlike...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy