Home | Amazing | Today | Tags | Publishers | Years | Search 
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Linux Web Server Development: A Step-by-Step Guide for Ubuntu, Fedora, and other Linux Distributions
Linux Web Server Development: A Step-by-Step Guide for Ubuntu, Fedora, and other Linux Distributions

Linux Web Server Development will teach you how to build a Linux Web server from scratch using Free/Open Source programs. The only requirement is a computer with an Internet connection. You will learn how to: • download and set up a Linux Web server • configure your router and Operating System • register and configure a Dynamic...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL
React Cookbook: Create dynamic web apps with React using Redux, Webpack, Node.js, and GraphQL

Over 66 hands-on recipes that cover UI development, animations, component architecture, routing, databases, testing, and debugging with React

Key Features

  • Use essential hacks and simple techniques to solve React application development challenges
  • Create native mobile...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
 
   
   
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy