Home | Amazing | Today | Tags | Publishers | Years | Search 
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

E-waste Recycling and Management: Present Scenarios and Environmental Issues (Environmental Chemistry for a Sustainable World)
E-waste Recycling and Management: Present Scenarios and Environmental Issues (Environmental Chemistry for a Sustainable World)

This book gives up-to-date information and broad views on e-waste recycling and management using the latest techniques for industrialist and academicians. It describes the problems of e-waste generated by all global living communities and its impact on our ecosystems and discusses recycling techniques in detail to reduce its effect...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

The Journey to the Mayflower: God's Outlaws and the Invention of Freedom
The Journey to the Mayflower: God's Outlaws and the Invention of Freedom
An authoritative and immersive history of the far-reaching events in England that led to the sailing of the Mayflower.

2020 brings readers the 400th anniversary of the sailing of the Mayflower—the ship that took the Pilgrim Fathers to the New World. It is a foundational event in American history,
...
Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems
Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems

?This book provides the first comprehensive view of safe and secure CPS and IoT systems.  The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different...

Tame Your Anxiety: Rewiring Your Brain for Happiness
Tame Your Anxiety: Rewiring Your Brain for Happiness

Anxiety is natural. Calm is learned.

If you didn’t learn yesterday, you can learn today.

It’s not easy, of course. Once your natural alarm system is triggered, it’s hard to find the off switch. Indeed, you don’t have an off switch until you build one....

Advanced API Security: OAuth 2.0 and Beyond
Advanced API Security: OAuth 2.0 and Beyond
Prepare for the next wave of challenges in enterprise security. Learn to better protect, monitor, and manage your public and private APIs.
Enterprise APIs have become the common way of exposing business functions to the outside world. Exposing functionality is convenient, but of course comes with a risk of
...
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
Ionic Liquids in Flow Assurance (SpringerBriefs in Petroleum Geoscience & Engineering)
This book focuses on the application of ionic liquids in flow assurance in the oil and gas industry. It discusses their physiochemical properties, and considers the role of ionic liquids as gas hydrate inhibitors in offshore pipelines.

Gas hydrate occurrence can pose a major threat to pipeline integrity. Therefore, different...

Mutiny and Leadership
Mutiny and Leadership
Whenever leadership emerges within a group, there will be resistance to that leadership. Discontent may manifest in a number of ways, and action will always be determined by factors such as resource, numbers, time, space, and the legitimacy of the resistance. What, then, turns discontent into
mutiny?

Mutiny is often
...
Effective Complaint Management (Management for Professionals)
Effective Complaint Management (Management for Professionals)

This practice- and research-based book caters to the needs of executive managers who see customer satisfaction as their primary goal. The authors identify the need for an effective complaint management strategy that prevents the loss of dissatisfied customers. Dissatisfied customers are at risk of migrating; accordingly,...

Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy