Home | Amazing | Today | Tags | Publishers | Years | Search 
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Professional Red Teaming: Conducting Successful Cybersecurity Engagements
Professional Red Teaming: Conducting Successful Cybersecurity Engagements

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools.

...

Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

E-waste Recycling and Management: Present Scenarios and Environmental Issues (Environmental Chemistry for a Sustainable World)
E-waste Recycling and Management: Present Scenarios and Environmental Issues (Environmental Chemistry for a Sustainable World)

This book gives up-to-date information and broad views on e-waste recycling and management using the latest techniques for industrialist and academicians. It describes the problems of e-waste generated by all global living communities and its impact on our ecosystems and discusses recycling techniques in detail to reduce its effect...

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide
The only official study guide for the new CCSP exam

(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you...

The Journey to the Mayflower: God's Outlaws and the Invention of Freedom
The Journey to the Mayflower: God's Outlaws and the Invention of Freedom
An authoritative and immersive history of the far-reaching events in England that led to the sailing of the Mayflower.

2020 brings readers the 400th anniversary of the sailing of the Mayflower—the ship that took the Pilgrim Fathers to the New World. It is a foundational event in American history,
...
Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems
Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems

?This book provides the first comprehensive view of safe and secure CPS and IoT systems.  The authors address in a unified manner both safety (physical safety of operating equipment and devices) and computer security (correct and sound information), which are traditionally separate topics, practiced by very different...

Death, Judgment, Heaven, and Hell: Sayings of the Fathers of the Church
Death, Judgment, Heaven, and Hell: Sayings of the Fathers of the Church
Catholic University of America Press is proud to present the second volume in its new Sayings of the Fathers of the Church Series. Featuring a wide range of scholars compiling material from our acclaimed Fathers of the Church volumes, each title will be devoted to a few specific areas of theology. The inaugural volume covered The...
The Lessons of Tragedy: Statecraft and World Order
The Lessons of Tragedy: Statecraft and World Order
An eloquent call to draw on the lessons of the past to address current threats to international order

The ancient Greeks hard?wired a tragic sensibility into their culture. By looking disaster squarely in the face, by understanding just how badly things could spiral out of control, they sought to create a
...
The Osteoporosis Manual: Prevention, Diagnosis and Management
The Osteoporosis Manual: Prevention, Diagnosis and Management

This comprehensive manual covers all aspects of the prevention, diagnosis and management of osteoporosis, offering an upbeat and optimistic assessment of what can be achieved. While scientifically based, the book provides easy-to-follow guidelines for lifelong maintenance of skeletal structure and function. It deals with everything...

Cato the Younger: Life and Death at the End of the Roman Republic
Cato the Younger: Life and Death at the End of the Roman Republic
Marcus Porcius Cato ("the Younger") is most famous for being Julius Caesar's nemesis. His sustained antagonism was in large part responsible for pushing the Romans towards civil war. Yet Cato never wanted war even though he used the threat of violence against Caesar. This strategic gamble misfired as Caesar, instead of...
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)
Ethical and Secure Computing: A Concise Module (Undergraduate Topics in Computer Science)

This engaging textbook highlights the essential need for a strong ethical framework in our approach to computer, information and engineering science. Through thought-provoking questions and case studies, the reader is challenged to consider the deeper implications arising from the use of today’s rapidly-evolving computing...

Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy