Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a
Hacking: The Beginners Guide to Master The Art of Hacking In No Time - Become a

Do you want to learn ethical hacking/ penetration testing but not sure where to begin? Does the amount of information on the web make you feel overwhelmed and confused? Or maybe your looking to start a career as an ethical hacker and want to further your skills? How about step by step, methodical, literally foolproof approaches to be...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

New Paradigm in Decision Science and Management: Proceedings of ICDSM 2018 (Advances in Intelligent Systems and Computing)
New Paradigm in Decision Science and Management: Proceedings of ICDSM 2018 (Advances in Intelligent Systems and Computing)

This book discusses an emerging area in computer science, IT and management, i.e., decision sciences and management. It includes studies that employ various computing techniques like machine learning to generate insights from huge amounts of available data; and which explore decision-making for cross-platforms that contain...

Digital Image Processing: PIKS Inside, Third Edition.
Digital Image Processing: PIKS Inside, Third Edition.
The book is intended to be an “industrial strength” introduction to digital image
processing to be used as a text for an electrical engineering or computer science
course in the subject. Also, it can be used as a reference manual for scientists who
are engaged in image processing research, developers of image processing
...
The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Linux in a Windows World
Linux in a Windows World
The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment. This book takes an in-depth look at exactly how Linux can be brought into an organization that's currently based...
Practical Perforce
Practical Perforce

When developers build software, they're able to keep track of all the different versions and all the components they use with software configuration management (SCM) systems. One of the more popular SCM products is Perforce.

Authored by Perforce's own VP of product technology, ...

Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
Manage IT as a Business : How to Achieve Alignment and Add Value to the Company
Many IT projects fail to deliver the benefits to the business that they promised. This is despite the fact that IT managers and staff work hard to meet the needs of the business by putting systems into place and ensuring that network operations are reliable and stable. The cause of this problem is almost always a misalignment of IT within the...
Information Systems: Achieving Success by Avoiding Failure
Information Systems: Achieving Success by Avoiding Failure
Despite people’s best efforts information systems are particularly prone to failure. Some systems never materialize, others appear late and/or over budget and those that are implemented often fail to deliver the promised levels of performance. The consequences of these failures affect people throughout the organization concerned and beyond,...
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series)
    Since the appearance of the authors' first volume on elliptic curve cryptography in 1999 there has been tremendous progress in the field. In some topics, particularly point counting, the progress has been spectacular. Other topics such as the Weil and Tate pairings have been applied in new and important ways to cryptographic...
CISA: Certified Information Systems Auditor Study Guide
CISA: Certified Information Systems Auditor Study Guide
Take charge of your career with certification that can increase your marketability. Demand for information systems auditors has increased dramatically since the adoption of the Sarbanes-Oxley Act in 2002. Now you can prepare for CISA certification and improve your job skills with the targeted training you'll receive in this valuable book.

...

SMS 2003 Administrator's Reference: Systems Management Server 2003
SMS 2003 Administrator's Reference: Systems Management Server 2003
Microsoft has really come a long way with management of systems within the corporate world. Micro -
soft Systems Management 2003 delivers a centralized management tool to support all of your computers,
workstations, servers, and other devices with the help of third-party solutions.
This book is designed to help the average SMS
...
unlimited object storage image
Result Page: 749 748 747 746 745 744 743 742 741 740 739 738 737 736 735 734 733 732 731 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy