Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
HP-UX 11i Systems Administration Handbook and Toolkit, Second Edition
HP-UX 11i Systems Administration Handbook and Toolkit, Second Edition

Your complete single source for HP-UX system administration!

Now, there's a single source for all the information HP-UX administrators needto succeed! Marty Poniatowski has updated the world's #1 HP-UX systemadministration guide to cover all the latest HP-UX 11i enhancements, plus all theUNIX commands...

Configuring and Troubleshooting Windows XP Professional
Configuring and Troubleshooting Windows XP Professional
The thing about Windows XP Professional is, users love it. It has a slick interface and it behaves far more intelligently and predictably than some of its predecessors. The new system of software registration aside, Windows XP surely is the most highly acclaimed Microsoft...
ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
PC Magazine Fighting Spyware, Viruses, and Malware
PC Magazine Fighting Spyware, Viruses, and Malware
Think there's no malicious software on your computer? PC Magazine thinks you should think again.

Scans by ISPs have revealed as many as twenty-eight spyware programs running on the average home computer—like yours. That's a lot of people prying into what's on your PC, and a DSL or cable connection is a virtual welcome mat. But by...

Control Systems Engineering
Control Systems Engineering

Highly regarded for its accessible writing and practical case studies, Control Systems Engineering is the most widely adopted textbook for this core course in Mechanical and Electrical engineering programs. This new sixth edition has been revised and updated with 20% new problems and greater emphasis on computer-aided design.

...

vSphere Design Best Practices
vSphere Design Best Practices

Apply industry-accepted best practices to design reliable high-performance datacenters for your business needs with this book and ebook.

Overview

  • Learn how to utilize the robust features of VMware to design, architect, and operate a virtual infrastructure using the VMware vSphere platform
  • ...
Comparing, Designing, and Deploying VPNs
Comparing, Designing, and Deploying VPNs

Virtual private networks (VPNs) enable organizations to connect offices or other sites over the Internet or a service provider network and allow mobile or home-based users to enjoy the same level of productivity as those who are in the same physical location as the central network. However, with so many flavors of VPNs available,...

Virtual Futures for Design, Construction and Procurement
Virtual Futures for Design, Construction and Procurement
"For the knowledgeable reader in ICT research it is a must to confirm where technology is now and moreover to see where it is going in the future." Building Engineer

Bill Bygrave is the Director of the Center for Entrepreneurial Studies at Babson College, where he also teaches Free Enterprise.
...
Book of Numbers
Book of Numbers

This book, more than any other I’ve written up to this point in my life, was a labor of love. It allowed me to combine the knowledge and experience of two careers (over a decade in government and law enforcement, and close to another decade in the computer field, encompassing almost 20 years of working with computers as a hobbyist).When...

Image Processing in C
Image Processing in C
This book is a tutorial on image processing. Each chapter explains basic concepts with words and figures, shows image processing results with pho- tographs, and implements the operations in C. Information herein comes from articles published in The C/C++ Users Journal from 1990 through 1998 and from the first edition of this book...
Researching Learning in Virtual Worlds (Human-Computer Interaction Series)
Researching Learning in Virtual Worlds (Human-Computer Interaction Series)

Most of the chapters in this book are extended papers from Research Learning in Virtual Environments (reLIVE08), an international conference held by the UK Open University in Milton Keynes in November 2008. Authors of the best papers and presentations from the conferences were invited to contribute to Research Learning in Virtual Worlds, the...

unlimited object storage image
Result Page: 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy