Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Samsung Galaxy Tabs For Dummies
Samsung Galaxy Tabs For Dummies

A colorful, entertaining, and informative guide to the Samsung Galaxy family of tablets

Samsung's bestselling Galaxy Tabs may come in multiple sizes, but they all share the wildly popular Android operating system and are packed with tons of top-notch tablet features. This full-color book shows you how...

Calcium Signalling in Cancer
Calcium Signalling in Cancer

Calcium signalling occupies a preeminent position in the signal transduction system of the cell by virtue of its participation in a wide range of physiological functions together with the biological events associated with genetic expression, cell proliferation and apoptosis, as well as cell differentiation and morphogenesis. It is an...

Pediatric Trauma: Pathophysiology, Diagnosis, and Treatment
Pediatric Trauma: Pathophysiology, Diagnosis, and Treatment

The definitive text on the state-of-the-art in pediatric trauma care, this reference offers detailed descriptions of procedures in system design, pediatric resuscitation, supportive care, diagnostic imaging, pain management, and transfusion therapy by experts with hands-on experience in the field. Providing evidence-based recommendations, as...

UNIX(R) System Security: A Guide for Users and System Administrators
UNIX(R) System Security: A Guide for Users and System Administrators

Many of the same features that have attracted the corporate and government world to UNIX have made security very difficult to control. This book examines several high-profile security break-ins, and then provides the information necessary to protect a UNIX system from unauthorized access. Covers all the most recent releases of UNIX.

...
Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Cyber-Physical Systems: Advances in Design & Modelling (Studies in Systems, Decision and Control)
Cyber-Physical Systems: Advances in Design & Modelling (Studies in Systems, Decision and Control)
This book presents new findings on cyber-physical systems design and modelling approaches based on AI and data-driven techniques, identifying the key industrial challenges and the main features of design and modelling processes. To enhance the efficiency of the design process, it proposes new approaches based on the concept of digital twins....
Advanced Linux Networking
Advanced Linux Networking

With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful...

J2EE Platform Web Services
J2EE Platform Web Services

Build robust, scalable, end-to-end business solutions with J2EE(TM) Web Services.

This is the definitive practitioner's guide to building enterprise-class J2EE Web Services that integrate with any B2B application and interoperate with any legacy system. Sun senior architect Ray Lai introduces 25...

HTTP Pocket Reference : Hypertext Transfer Protocol
HTTP Pocket Reference : Hypertext Transfer Protocol

This book describes HTTP, the Hypertext Transfer Protocol. It provides a high level description of how the protocol works, along with reference information on client requests and server responses. Included are dumps of HTTP transactions, as well as tabular data that summarizes most of the standardized parameters used in...

sendmail, 3rd Edition
sendmail, 3rd Edition
The new edition of sendmail has been completely revised to cover sendmail 8.12--a version with more features and fundamental changes than any previous version of the Unix-based email routing program. Because the latest version of sendmail differs so significantly from earlier versions, a massive rewrite of this...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
unlimited object storage image
Result Page: 684 683 682 681 680 679 678 677 676 675 674 673 672 671 670 669 668 667 666 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy