Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Network Security Test Lab: A Step-by-Step Guide
The Network Security Test Lab: A Step-by-Step Guide

The ultimate hands-on guide to IT security and proactivedefense

The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment...

Geeks On Call PC's: 5-Minute Fixes
Geeks On Call PC's: 5-Minute Fixes
Showing your PC who's boss

PCs have evolved dramatically, and as they've grown more powerful and versatile, they've also become more complex. No doubt there have been times when you were sure the PC was running the show, not you. Geeks On Call can put you back in charge. Here are simple and straightforward ways to understand your PC,...

The Complete Guide to Software Testing
The Complete Guide to Software Testing

The Complete Guide to Software Testing Bill Hetzel Gain a new perspective to software testing as a life cycle activity, not merely as something that happens at the end of coding. This edition is completely revised and contains new chapters on testing methodologies including ANSI standard-based testing—a survey of testing practices. Dr....

Building Software for Simulation: Theory and Algorithms, with Applications in C++
Building Software for Simulation: Theory and Algorithms, with Applications in C++

Simulation has made possible systems that would otherwise be impracticable. The sophisticated controls in modern aircraft and automobiles, the powerful microprocessors in desktop computers, and space-faring robots are possible because simulations reduce substantially the need for expensive prototypes. These complicated systems are designed...

Kali Linux: Assuring Security By Penetration Testing
Kali Linux: Assuring Security By Penetration Testing

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the...
Smashing UX Design: Foundations for Designing Online User Experiences
Smashing UX Design: Foundations for Designing Online User Experiences

The ultimate guide to UX from the world’s most popular resource for web designers and developers

Smashing Magazine is the world′s most popular resource for web designers and developers and with this book the authors provide the ideal resource for mastering User Experience Design (UX). 

...

Customer Analytics For Dummies
Customer Analytics For Dummies

The easy way to grasp customer analytics

Ensuring your customers are having positive experiences with your company at all levels, including initial brand awareness and loyalty, is crucial to the success of your business. "Customer Analytics For Dummies" shows you how to measure each stage of the customer journey and use...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
JNCIA: Juniper Networks Certified Internet Associate Study Guide
JNCIA: Juniper Networks Certified Internet Associate Study Guide

Here’s the book you need to prepare for the JNCIA exam JNO-201 from Juniper Networks. Written by a team of Juniper Networks trainers and engineers, this Study Guide provides:

  • Assessment testing to focus and direct your studies
  • In-depth coverage of official test objectives
  • Hundreds of...
HTML, XHTML, and CSS Bible
HTML, XHTML, and CSS Bible
If HTML, XHTML, and CSS can do it, you can do it too...

Whether hand-coded or created by a visual editor, static or dynamic, most Web pages rely on HTML. The more you know about this language and its companion technologies, XHTML and CSS, the more flexible, creative, and effective your Web site will be. This all-new...

Software Testing (2nd Edition)
Software Testing (2nd Edition)
Software Testing is the book for new or aspiring software testers interested in learning about this crucial part of the software development process. The complexity and size of today's software makes writing bug-free code extremely difficult, even for highly experienced programmers. Couple that with our increasing reliance on software for...
unlimited object storage image
Result Page: 145 144 143 142 141 140 139 138 137 136 135 134 133 132 131 130 129 128 127 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy