Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Switching to Angular 2
Switching to Angular 2

Key Features

  • Get up to date with the latest changes to Angular 2, including the improvements to directives, change detection, dependency injection, router, and more
  • Understand Angular 2's new component-based architecture
  • Start using TypeScript to supercharge your Angular 2...
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID

Protect your network with Snort: the high-performance, open source IDS

Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all...

Mastering Wireshark
Mastering Wireshark

Key Features

  • Master Wireshark and train it as your network sniffer
  • Impress your peers and get yourself pronounced as a network doctor
  • Understand Wireshark and its numerous features with the aid of this fast-paced book packed with numerous screenshots, and become a pro at resolving network...
Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management
Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management

Explaining how to apply to mathematical programming to network design and control, Linear Programming and Algorithms for Communication Networks: A Practical Guide to Network Design, Control, and Management fills the gap between mathematical programming theory and its implementation in communication networks. From the...

Advanced PIC Microcontroller Projects in C: From USB to RTOS with the PIC 18F Series
Advanced PIC Microcontroller Projects in C: From USB to RTOS with the PIC 18F Series
This book is ideal for the engineer, technician, hobbyist and student who have knowledge of the basic principles of PIC microcontrollers and want to develop more advanced applications using the 18F series.

The architecture of the PIC 18FXXX series as well as typical oscillator, reset, memory, and input-output circuits is completely
...
GNS3 Network Simulation Guide
GNS3 Network Simulation Guide

Acquire a comprehensive knowledge of the GNS3 graphical network simulator, using it to prototype your network without the need for physical routers

Overview

  • Develop your knowledge for Cisco certification (CCNA, CCNP, CCIE), using GNS3
  • Install GNS3 successfully on Windows, Linux, or OS...
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)
NX-OS and Cisco Nexus Switching: Next-Generation Data Center Architectures (Networking Technology)

Cisco® Nexus switches and the new NX-OS operating system are rapidly becoming the new de facto standards for data center distribution/aggregation layer networking. NX-OS builds on Cisco IOS to provide advanced features that will be increasingly crucial to efficient data center operations. NX-OS and Cisco...

Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook (2nd Edition)

Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series...

WordPress For Dummies (For Dummies (Computer/Tech))
WordPress For Dummies (For Dummies (Computer/Tech))

The bestselling guide to WordPress—fully updated

Updated to capture all the changes expected to come with the latest release of WordPress, the brand-new edition of this bestselling guide gives you an all-access pass to using this powerful publishing platform to get your very own blog or website up and running—in...

Machine Vision : Theory, Algorithms, Practicalities
Machine Vision : Theory, Algorithms, Practicalities
In the last 40 years, machine vision has evolved into a mature field embracing a wide range of applications including surveillance, automated inspection, robot assembly, vehicle guidance, traffic monitoring and control, signature verification, biometric measurement, and analysis of remotely sensed images. While researchers and industry specialists...
Smart Home Automation with Linux and Raspberry Pi
Smart Home Automation with Linux and Raspberry Pi

Smart Home Automation with Linux and Raspberry Pi shows you how to automate your lights, curtains, music, and more, and control everything via a laptop or mobile phone.

You'll learn how to use Linux, including Linux on Raspberry Pi, to control appliances and everything from kettles to curtains, including how to hack...

Result Page: 50 49 48 47 46 45 44 43 42 41 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy