Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems

It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?

With an expanded discussion of network protocols and 45 completely new scenarios, this extensively...

Penetration Testing Bootcamp
Penetration Testing Bootcamp

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

...

Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks
Traffic Engineering and QoS Optimization of Integrated Voice & Data Networks
This book describes, analyzes, and recommends traffic engineering (TE) and quality of service (QoS) optimization methods for integrated voice/data dynamic routing networks. These functions control a network's response to traffic demands and other stimuli, such as link failures or node failures. TE and QoS optimization is concerned with measurement,...
Programming Many-Core Chips
Programming Many-Core Chips

Parallel computing has been confined, for much of its over 40 year history, to highly specialized, technology-wise advanced domains such as scientific computing or telecommunications. There were only a few experts who had the background and experience to write efficient, robust and scalable programs for these parallel machines.

...

Wireshark® 101: Essential Skills for Network Analysis
Wireshark® 101: Essential Skills for Network Analysis

This book is written for beginner analysts and includes 46 step-by-step labs to walk you through many of the essential skills contained herein. This book provides an ideal starting point whether you are interested in analyzing traffic to learn how an application works, you need to troubleshoot slow network performance, or determine whether a...

Nginx HTTP Server - Second Edition
Nginx HTTP Server - Second Edition

Nginx is a lightweight HTTP server designed for high-traffic websites, with network scalability as the primary objective. With the advent of high speed Internet access, short loading times and fast transfer rates have become a necessity. This free, open source solution will either come as a full replacement of other software such as Apache,...

Switching to Angular 2
Switching to Angular 2

Key Features

  • Get up to date with the latest changes to Angular 2, including the improvements to directives, change detection, dependency injection, router, and more
  • Understand Angular 2's new component-based architecture
  • Start using TypeScript to supercharge your Angular 2...
Technical Blogging: Turn Your Expertise into a Remarkable Online Presence
Technical Blogging: Turn Your Expertise into a Remarkable Online Presence

Technical Blogging is the first book to specifically teach programmers, technical people, and technically-oriented entrepreneurs how to become successful bloggers. There is no magic to successful blogging; with this book you'll learn the techniques to attract and keep a large audience of loyal, regular readers and leverage this...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
GNS3 Network Simulation Guide
GNS3 Network Simulation Guide

Acquire a comprehensive knowledge of the GNS3 graphical network simulator, using it to prototype your network without the need for physical routers

Overview

  • Develop your knowledge for Cisco certification (CCNA, CCNP, CCIE), using GNS3
  • Install GNS3 successfully on Windows, Linux, or OS...
Result Page: 49 48 47 46 45 44 43 42 41 40 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy