Home | Amazing | Today | Tags | Publishers | Years | Search 
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Managing Information Security Risks: The OCTAVE Approach
Managing Information Security Risks: The OCTAVE Approach

Information security requires far more than the latest tool or technology. Organizations must understand exactly what they are trying to protect--and why--before selecting specific solutions. Security issues are complex and often are rooted in organizational and business concerns. A careful evaluation of security needs and...

RADIUS
RADIUS
RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protocol that enables companies to authenticate, authorize and account for remote users who want access to a system or service from a central network server. RADIUS provides a complete, detailed guide to the underpinnings of the RADIUS...
Hacker Disassembling Uncovered
Hacker Disassembling Uncovered
This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.

This book is dedicated to the basics of hacking—methods of analyzing programs using a...

Beginning MapServer: Open Source GIS Development (Expert's Voice in Open Source)
Beginning MapServer: Open Source GIS Development (Expert's Voice in Open Source)
Maps have played a prominent role in human activity for thousands of years. One of the earliest known maps was uncovered during the course of an archaeological excavation in Turkey in 1961. The Çatalhöyük site is a neolithic settlement dating from approximately 6500 BC. The map consists of a partially preserved, painted plaster...
Everybody Wins: The Story and Lessons Behind RE/MAX
Everybody Wins: The Story and Lessons Behind RE/MAX
Our research team conducted more than 50 focused, multihour interviews
with key people inside RE/MAX International and throughout its network.
We studied the real estate industry and talked to experts. We spent
weeks with Dave and Gail Liniger and got to know the members of the
senior team well. We were allowed to poke about,
...
Oracle Applications DBA Field Guide
Oracle Applications DBA Field Guide
The Oracle E-Business Suite is like a machine that requires constant maintenance
and fine-tuning. With experience comes the knowledge of how to
tweak the parts and use the tools to make it run properly. Even for the experienced
administrator, Oracle Applications is complicated to administer—let’s
be honest, at times
...
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
Data Mining: Practical Machine Learning Tools and Techniques, Second Edition
This book presents this new discipline in a very accessible form: both as a text to train the next generation of practitioners and researchers, and to inform lifelong learners like myself. Witten and Frank have a passion for simple and elegant solutions. They approach each topic with this mindset, grounding all concepts in concrete examples,...
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Conspiracy in Camelot: The Complete History of the Assassination of John Fitzgerald Kennedy
Those not already deeply immersed in recondite Kennedy assassination lore will find this offering by Kroth-an associate professor of counseling psychology at Santa Clara University, and a contributor to CounterPunch, a biweekly "muckraking newsletter"-well over the top. Advertised as an "objective" look at the myriad conspiracy...
Formal Software Development
Formal Software Development
This book is intended for final-year undergraduate and postgraduate computing students specializing in the field of software engineering. The text concentrates on the challenges that high integrity software development poses, and how formal methods can help meet these challenges.

Formal methods have long been advocated for the
...
Autism Spectrum Disorders: Identification, Education, and Treatment
Autism Spectrum Disorders: Identification, Education, and Treatment
The field of autism has been growing at an unprecedented rate in recent years. In addition to an actual rise in the number of classic DSM-IV cases, broadened diagnostic criteria have uncovered a wider range of autistic behaviors and ability levels. The third edition of this well-known text continues the mission of its predecessors--to present a...
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Result Page: 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy