Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Java 9 for Programmers (4th Edition) (Deitel Developer Series)
Java 9 for Programmers (4th Edition) (Deitel Developer Series)

The professional programmer’s Deitel® guide to Java® 9 and the powerful Java platform

 

Written for programmers with a background in another high-level language, this book applies the...

Deep Learning Cookbook: Practical Recipes to Get Started Quickly
Deep Learning Cookbook: Practical Recipes to Get Started Quickly

Deep learning doesn’t have to be intimidating. Until recently, this machine-learning method required years of study, but with frameworks such as Keras and Tensorflow, software engineers without a background in machine learning can quickly enter the field. With the recipes in this cookbook, you’ll learn how to solve...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

UNIX and Linux System Administration Handbook (5th Edition)
UNIX and Linux System Administration Handbook (5th Edition)

UNIX® and Linux® System Administration Handbook, Fifth Edition, is today’s definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure.

 

...
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)
CCNA Cyber Ops SECOPS 210-255 Official Cert Guide (Certification Guide)

Learn, prepare, and practice for CCNA Cyber Ops SECOPS #210-255 exam success with this Official Cert Guide from Pearson IT Certification, a leader in IT Certification learning.

  • Master CCNA Cyber Ops SECOPS #210-255 exam topics
Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Raspberry Pi for Python Programmers Cookbook - Second Edition
Raspberry Pi for Python Programmers Cookbook - Second Edition

About This Book

  • Install your first operating system, share files over the network, and run programs remotely
  • Construct robots and interface with your own circuits and purpose built add-ons, as well as adapt off-the-shelf household devices using this pragmatic guide
  • Packed with clear,...
Auto Repair For Dummies
Auto Repair For Dummies

The top-selling auto repair guide--400,000 copies sold--now extensively reorganized and updated

Forty-eight percent of U.S. households perform at least some automobile maintenance on their own, with women now accounting for one third of this $34 billion automotive do-it-yourself market. For new or would-be do-it-yourself
...

Dictionary of Computer and Internet Terms (Words R Us Computer Dictionaries) (Volume 1)
Dictionary of Computer and Internet Terms (Words R Us Computer Dictionaries) (Volume 1)

This dictionary contains over 32,000 terms that are specific to Computers and the Internet. Each term includes a definition / description. With more than 750 pages, this dictionary is one of the most comprehensive resources available. Terms relate to applications, commands, functions, operating systems, image processing and networking. No...

Blockchain Basics: A Non-Technical Introduction in 25 Steps
Blockchain Basics: A Non-Technical Introduction in 25 Steps

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.

This book...

Result Page: 640 639 638 637 636 635 634 633 632 631 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy