Home | Amazing | Today | Tags | Publishers | Years | Search 
Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Packet Tracer Network Simulator (Professional Expertise Distilled)
Packet Tracer Network Simulator (Professional Expertise Distilled)

Packet Tracer Network Simulator is a practical guide that thoroughly explains the features and uses of Packet Tracer with the help of practical examples that will help you to create your own complex topologies and emulate learning environments. This book will cover using Packet Tracer with PCs, laptops, and servers, with a brief description...

Backbone.js Patterns and Best Practices
Backbone.js Patterns and Best Practices

Improve your Backbone.js skills with this step-by-step guide to patterns and best practice. It will help you reduce boilerplate in your code and provide plenty of open source plugin solutions to common problems along the way.

Overview

  • Offers solutions to common Backbone.js related problems that most...
Windows NT SNMP
Windows NT SNMP

As communications networks grow in size and complexity, it becomes increasingly difficult to locally manage and control all of the devices (e.g., routers, servers, and workstations) on those networks. SNMP (Simple Network Management Protocol) gives you a way to manage network devices remotely. You can use SNMP to check on the...

Cisco Networking Essentials
Cisco Networking Essentials

Start a career in networking

Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinking of...

Mule ESB Cookbook
Mule ESB Cookbook

If you're familiar with Java, this book will enable you to create a lightweight enterprise service bus using the Mule framework. Starting with the basics, you'll soon have applications on different platforms communicating with each other.

Overview

  • Step-by-step practical recipes to get started with...
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)
Mining and Control of Network Traffic by Computational Intelligence (Studies in Computational Intelligence)

As other complex systems in social and natural sciences as well as in engineering, the Internet is hard to understand from a technical point of view. Packet switched networks defy analytical modeling. The Internet is an outstanding and challenging case because of its fast development, unparalleled heterogeneity and the inherent lack of...

Mastering Embedded Linux Programming
Mastering Embedded Linux Programming

Key Features

  • Create efficient and secure embedded devices using Linux
  • Minimize project costs by using open source tools and programs
  • Explore each component technology in depth, using sample implementations as a guide

Book Description

Mastering Embedded Linux...

Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)
Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network...

Introduction to Networks Companion Guide
Introduction to Networks Companion Guide

Introduction to Networks Companion Guide is the official supplemental textbook for the Introduction to Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.

 

The course introduces the...

Information Security: The Complete Reference, Second Edition
Information Security: The Complete Reference, Second Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud...

Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition

Cutting-edge techniques for finding and fixing critical security flaws

Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...

Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy