Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Definitive Guide to Linux Network Programming (Expert's Voice)
The Definitive Guide to Linux Network Programming (Expert's Voice)

This book is…one nice and convenient package that I will keep on the shelf as a reference manual.

The Definitive Guide to Linux Network Programming offers a clear, concise treatment of creating clients and servers under the Linux operating system. This book assumes that you know C and have experience developing code on...

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)

For use with all versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mandriva, Mint, and now OS X, too!

  • Get more done faster, and become a true Linux guru by mastering the command line!
  • ...
Technological Turf Wars: A Case Study of the Antivirus Industry
Technological Turf Wars: A Case Study of the Antivirus Industry

In Technological Turf Wars, Jessica Johnston analyzes the tensions and political dilemmas that coexist in the interrelationship among science, technology and society. Illustrating how computer security is as concerned with social relationships as it is with technology, Johnston provides an illuminating ethnography that...

Spring Security 3.1
Spring Security 3.1

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...

Multihop Wireless Networks: Opportunistic Routing (Wireless Communications and Mobile Computing)
Multihop Wireless Networks: Opportunistic Routing (Wireless Communications and Mobile Computing)

This book provides an introduction to opportunistic routing an emerging technology designed to improve the packet forwarding reliability, network capacity and energy efficiency of multihop wireless networks

This book presents a comprehensive background to the technological challenges lying behind opportunistic routing. The...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Practical Information Security Management: A Complete Guide to Planning and Implementation
Practical Information Security Management: A Complete Guide to Planning and Implementation

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective information...

Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications
Learn Bitcoin and Blockchain: Understanding blockchain and Bitcoin architecture to build decentralized applications

Get up and running with the fundamentals of Bitcoin and blockchain

Key Features

  • Learn quick, effective, and easy ways to master blockchain and Bitcoin
  • Understand the impact of decentralization and discover ways to tackle it
  • Explore the future of Bitcoin...
Microservices for the Enterprise: Designing, Developing, and Deploying
Microservices for the Enterprise: Designing, Developing, and Deploying
Understand the key challenges and solutions around building microservices in the enterprise application environment. This book provides a comprehensive understanding of microservices architectural principles and how to use microservices in real-world scenarios.

Architectural challenges using microservices with service
...
MCSA/MCSE 70-299 Exam Cram 2 : Implementing and Administering Security in a Windows 2003 Network
MCSA/MCSE 70-299 Exam Cram 2 : Implementing and Administering Security in a Windows 2003 Network
The 70-299 exam measures your ability to implement, manage, maintain, and troubleshoot security in a Windows Server 2003 network infrastructure and also plan and configure a Windows Server 2003 PKI. The MCSE 70-299 Exam Cram 2 gives you the essential information you need to know to learn how to implement, manage,...
MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure
MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure
Welcome to MCSE Self-Paced Training Kit (Exam 70-294): Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
This kit introduces you to Windows Server 2003 Active Directory and prepares you to plan, configure, and administer your Active Directory infrastructure. You will learn to use Active
...
unlimited object storage image
Result Page: 345 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy