Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it...

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab

Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price!

Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a...

Building DMZs for Enterprise Networks
Building DMZs for Enterprise Networks
During the course of the last few years, it has become increasingly evident that there is
a pronounced need for protection of internal networks from the outside world. As
machine technologies have improved and extensive shifts in the functions that a user
can accomplish through more user-friendly interfaces have occurred, many more
...
LEGO Software Power Tools, With LDraw, MLCad, and LPub
LEGO Software Power Tools, With LDraw, MLCad, and LPub

Create Virtual 3D LEGO Models Using LEGO Software Power Tools LEGO Master Builders have created a powerful set of tools that are distributed as freeware to the LEGO community to assist LEGO fans in their building adventures. Until now, these tools have been difficult to find, and even more difficult to configure to work with one another....

Infosec Management Fundamentals
Infosec Management Fundamentals

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the...

Windows Forensic Analysis DVD Toolkit, Second Edition
Windows Forensic Analysis DVD Toolkit, Second Edition

"If your job requires investigating compromised Windows hosts, you must read Windows Forensic Analysis."
-Richard Bejtlich, Coauthor of Real Digital Forensics and Amazon.com Top 500 Book Reviewer

"The Registry Analysis chapter alone is worth the price of the book."
-Troy Larson, Senior
...

10 Cool LEGO Mindstorms: Dark Side Robots, Transports, and Creatures: Amazing Projects You Can Build in Under an Hour
10 Cool LEGO Mindstorms: Dark Side Robots, Transports, and Creatures: Amazing Projects You Can Build in Under an Hour

LEGO MINDSTORMS let you design and program robots that can do just about anything!

The Dark Side Developer's Kit is targeted towards the young or novice LEGO MINDSTORMS designer, age 9 and up, although experienced MINDSTORMS fans will appreciate the unique possibilities offered by this kit as well. The Dark Side Developer's...

Writing Security Tools and Exploits
Writing Security Tools and Exploits
Exploits. In most information technology circles these days, the term exploits has
become synonymous with vulnerabilities or in some cases, buffer overflows. It is not
only a scary word that can keep you up at night wondering if you purchased the best
firewalls, configured your new host-based intrusion prevention system correctly,
...
MCSA/MCSE Exam 70-291 Study Guide and Training System: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure
MCSA/MCSE Exam 70-291 Study Guide and Training System: Implementing, Managing, and Maintaining a Windows Server 2003 Network Infrastructure
All of Microsoft’s published objectives for the
MCSA/MCSE 70-291 Exam are covered in this book.
To help you easily find the sections that directly
support particular objectives, we’ve listed all of the
exam objectives below, and mapped them to the
Chapter number in which they are covered. We’ve
also
...
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts
Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

A company’s most important asset next to its people is its information. This information includes intellectual property, company financial information, confidential employee information, customer information, and so much more. Company information may be stored in databases, spreadsheets, flat files, and so on. Loss of...

MCSE Exam 70-294 Study Guide and DVD Training System: Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure
MCSE Exam 70-294 Study Guide and DVD Training System: Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure
All of Microsoft’s published objectives for the MCSE 70-
294 Exam are covered in this book. To help you easily
find the sections that directly support particular
objectives, we’ve listed all of the exam objectives
below, and mapped them to the Chapter number in
which they are covered. We’ve also assigned
...
unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy