Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Oracle 12c: SQL
Oracle 12c: SQL

Now you can master the latest version of the fundamental SQL language used in all relational databases today with ORACLE 12C: SQL, 3E. Much more than a study guide, this edition helps you transform a basic knowledge of databases into proficiency with the latest SQL and Oracle concepts and techniques. You learn to use Oracle 12c SQL most...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
The Professional Scrum Master's Handbook (Professional Expertise Distilled)
The Professional Scrum Master's Handbook (Professional Expertise Distilled)

Key Features

  • Checklists, questions, and exercises to get you thinking (and acting) like a professional ScrumMaster
  • Presented in a relaxed, jargon-free, personable style
  • Full of ideas, tips, and anecdotes based on real-world experiences

Book Description

A...

Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics

This book will prove to be a practical resource for anyone who is considering using, building, or securing a cloud implementation. Security professionals may refer to this book as a source of detailed information for evaluating and verifying cloud security policy and requirements. Cloud infrastructure engineers, cloud services...

Lonely Planet Ecuador & the Galapagos Islands (Country Guide)
Lonely Planet Ecuador & the Galapagos Islands (Country Guide)

“Colonial cities, misty cloud forests, towering Andean peaks, Amazonian rainforest and the otherworldly Galapagos: for such a small country Ecuador has a stunning array of natural and cultural wonders.” – Regis St Louis, Lonely Planet Writer

Our Promise
You can trust our travel information
...

Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
"I commend this book to you as your springboard to the future of how to make the Net work."
-from the Foreword by Simon Phipps, Chief Technology Evangelist, Sun Microsystems, Inc.

This hands-on developer's guide to Web services prepares you for the next level of distributed computing. The authors clearly show
...
Cloud Computing: Web-Based Dynamic IT Services
Cloud Computing: Web-Based Dynamic IT Services

Cloud computing is on everyone’s lips: as an innovative technology, as the next generation of the Internet, as a fundamental transformation of the entire IT landscape, and as an auspicious opportunity to introduce new business ideas. But what is actually at the heart of this notion?

As a result of the multi-faceted...

Essentials of Statistics for Business and Economics (with CD-ROM)
Essentials of Statistics for Business and Economics (with CD-ROM)

Trust the latest version of this market-leading essentials text to introduce sound statistical methodology in a proven applications setting. ESSENTIALS OF STATISTICS FOR BUSINESS AND ECONOMICS, 5e, includes all of the strengths of the longer best-selling Anderson/Sweeney/Williams STATISTICS FOR BUSINESS AND ECONOMICS, with a focus on the most...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Security in Ad-hoc and Sensor Networks (Computer and Network Security)
Security in Ad-hoc and Sensor Networks (Computer and Network Security)

Ad hoc and sensor networks continue to have a growing impact on communication. These cost-effective wireless networks provide location independent computing in environments ranging from military battlefields to in-home patient monitoring systems. However, having real-time connectivity to critical information over an open...

PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid
"...The World's first user-friendly book on email privacy...unless you're a cryptographer, or never use email, you should read this book." —Len Sassaman, CodeCon Founder

"Today, most email is sent like a postcard. We all should want to put our mail back into secure envelopes again. PGP and GPG are two of the leading tools...

Result Page: 32 31 30 29 28 27 26 25 24 23 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy