Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Programming Multicore and Many-core Computing Systems (Wiley Series on Parallel and Distributed Computing)
Programming Multicore and Many-core Computing Systems (Wiley Series on Parallel and Distributed Computing)

Programming multi-core and many-core computing systems

Sabri Pllana, Linnaeus University, Sweden

Fatos Xhafa, Technical University of Catalonia, Spain

Provides state-of-the-art methods for programming multi-core and many-core systems

The book comprises a selection of twenty two...

Systems Analysis and Design (Shelly Cashman Series)
Systems Analysis and Design (Shelly Cashman Series)

Discover a practical, streamlined, updated approach to information systems development that covers both traditional and emerging technologies and approaches to systems analysis and design. SYSTEMS ANALYSIS AND DESIGN, 11E offers a well-organized, streamlined approach. Chapter objectives are keyed directly to chapter headings, making content...

Distributed Algorithms: An Intuitive Approach (The MIT Press)
Distributed Algorithms: An Intuitive Approach (The MIT Press)

A comprehensive guide to distributed algorithms that emphasizes examples and exercises rather than mathematical argumentation.

This book offers students and researchers a guide to distributed algorithms that emphasizes examples and exercises rather than the intricacies of mathematical models. It avoids mathematical...

Machine Learning and Security: Protecting Systems with Data and Algorithms
Machine Learning and Security: Protecting Systems with Data and Algorithms

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...

Internet of Things with Arduino Cookbook
Internet of Things with Arduino Cookbook

Key Features

  • This book offers key solutions and advice to address the hiccups faced when working on Arduino-based IoT projects in the real world
  • Take your existing skills and capabilities to the next level by building challenging IoT applications with ease.
  • Be the tech disruptor you always...
TensorFlow for Deep Learning: From Linear Regression to Reinforcement Learning
TensorFlow for Deep Learning: From Linear Regression to Reinforcement Learning

Learn how to solve challenging machine learning problems with TensorFlow, Google’s revolutionary new software library for deep learning. If you have some background in basic linear algebra and calculus, this practical book introduces machine-learning fundamentals by showing you how to design systems capable of detecting objects...

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical
...

Certified Ethical Hacker (CEH) Foundation Guide
Certified Ethical Hacker (CEH) Foundation Guide

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation...

Exploring Java 9: Build Modularized Applications in Java
Exploring Java 9: Build Modularized Applications in Java
Discover all the new features and changes in Java 9, including module systems―JPMS or Project Jigsaw. This book covers the whole Java application development life cycle. You'll review all the important concepts, including module descriptor, unnamed module, automatic module, and command line tools. 

CoreOS in Action: Running Applications on Container Linux
CoreOS in Action: Running Applications on Container Linux

Summary

CoreOS in Action is a clear tutorial for deploying container-based systems on CoreOS Container Linux.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

Traditional Linux...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Result Page: 767 766 765 764 763 762 761 760 759 758 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy