Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Software Process Quality : Management and Control
Software Process Quality : Management and Control
Software presents both an opportunity and a threat. Software runs our lives. The list of applications in which software is a critical component is endless: elevators, airlines, telecommunications, medical devices, education, and countless others. Data from the Software Engineering Institute indicates that approximately 60% of software development...
Bacterial Resistance to Antimicrobials
Bacterial Resistance to Antimicrobials

Focuses on combating bacterial pathogens by understanding their strategies of defense!

Each chapter begins with a summary of concepts, so those not actively working in the field gain an overall picture of what follows!

Highlights antibiotic resistance in pathogens that poses the greatest threat to human
...

Solar Energy Engineering: Processes and Systems
Solar Energy Engineering: Processes and Systems
With the threat of global warming, and the gradual depletion of petroleum supplies, solar electric power is rapidly becoming significant part of our energy mix. The range of solar cells spans different materials and different structures in the quest to extract maximum power from the device while keeping the cost to a minimum. Devices with...
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

MPLS VPN Security
MPLS VPN Security
A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and...
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
Since the publication of Malware Forensics: Investigating and Analyzing Malicious Code in 2008, the number and complexity of programs developed for malicious and illegal purposes has grown substantially. The 2011 Symantec Internet Security Threat Report announced that over 286 million new threats emerged in the past year....
Insulin Resistance: Insulin Action and its Disturbances in Disease
Insulin Resistance: Insulin Action and its Disturbances in Disease
Hormone resistance syndromes are typically thought of as rare, usually genetic, disorders with a severe but relatively stereotyped clinical and biochemical profile. While there are syndromes of severe insulin resistance that conform to this description, defective insulin action is of much more pervasive biomedical importance....
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky...
Cyber Adversary Characterization: Auditing the Hacker Mind
Cyber Adversary Characterization: Auditing the Hacker Mind
A book about hacking is a book about everything.
First, the meaning of hacker.

The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine...
Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)
Emerging Viral Diseases of Southeast Asia (Issues in Infectious Diseases, Vol. 4)

Southeast Asia has been the breeding ground for many emerging diseases in the past decade, e.g. the avian flu (H5N1) in Hong Kong in 1997, Nipah virus encephalitis in Malaysia in 1998, and, above all, the SARS outbreak in Southern China in 2002. Risk factors contributing to this situation include being economically disadvantaged, sub-standard...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy