Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Logic Pro X For Dummies (For Dummies (Computer/Tech))
Logic Pro X For Dummies (For Dummies (Computer/Tech))

Crank your sound up to X with Apple's premier recording software and Logic Pro X For Dummies!

Apple's Logic Pro X levels the playing field, making high-quality studio recordings accessible for any musician. It's a professional-level tool with a user-friendly interface and loads of new features to keep you...

Java Performance: The Definitive Guide
Java Performance: The Definitive Guide

Coding and testing are often considered separate areas of expertise. In this comprehensive guide, author and Java expert Scott Oaks takes the approach that anyone who works with Java should be equally adept at understanding how code behaves in the JVM, as well as the tunings likely to help its performance.

You’ll...

Network Security Foundations : Technology Fundamentals for IT Success
Network Security Foundations : Technology Fundamentals for IT Success
The world of IT is always evolving, but in every area there are stable, core concepts that anyone just setting out needed to know last year, needs to know this year, and will still need to know next year. The purpose of the Foundations series is to identify these concepts and present them in a way that gives you the...
Aggressive Network Self-Defense
Aggressive Network Self-Defense
I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
  • Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
  • Follow the travails of eight system administrators who take cyber law into their own hands.
  • ...
Nuendo Power!
Nuendo Power!
Whether you are a musician, recording engineer, sound designer, video editor, or other type of
media author, certainly you have noticed that the demands of audio production in today’s multimedia
environment have increased dramatically. With the proliferation of surround sound systems in theaters,
homes, and specialized
...
Strategies for Managing Is/It Personnel
Strategies for Managing Is/It Personnel

As IT staff shortages are being experienced worldwide, with a huge gap between the number of positions available for IS/IT workers and the number of available qualified workers to fill them. The major factors that have contributed to the IS/IT crisis include lack of understanding of the career orientations of IS personnel; high IS staff...

Professional haXe and Neko
Professional haXe and Neko
Professional haXe and Neko

haXe is an exciting new programming language, as well as a compiler and a framework, that can be used to build web applications and write code aimed at multiple platforms on an array of operating systems. Neko is a fast, flexible, and reliable cross-platform virtual machine that allows for the...

Programming the Microsoft Windows Driver Model, Second Edition
Programming the Microsoft Windows Driver Model, Second Edition

Writing a WDM driver is much like writing a kernel-mode driver for Windows NT 4.0. It's a bit easier because you don't have to detect and configure your own hardware. Ironically, it's simultaneously harder because correctly handling Plug and Play and power management is fiendishly difficult. If...

Reason 3 for Windows and Macintosh : Visual QuickStart Guide
Reason 3 for Windows and Macintosh : Visual QuickStart Guide
Combining pristine sound quality with a comfortably retro-styled virtual rack (including a polyphonic synthesizer, mixing console, sampler, and drum machine), Reason has won legions of fans since its introduction. Now, everyone is singing its praises -- from bands like Nine Inch Nails and Prodigy to video producers. Here to show you why is the...
WildFly: New Features
WildFly: New Features

Get acquainted with the exciting new features that WildFly has to offer with this book and ebook

Overview

  • Learn about the latest WildFly components, including CLI management, classloading, and custom modules
  • Customize your web server and applications by managing logs, virtual hosts, and the...
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology...

unlimited object storage image
Result Page: 104 103 102 101 100 99 98 97 96 95 94 93 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy