Home | Amazing | Today | Tags | Publishers | Years | Search 
Network Safety: Network5 Safety Certification
Network Safety: Network5 Safety Certification

Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known as black hats are preying on information systems of government, corporate, public, and private networks and are...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach
Moffet's Pediatric Infectious Diseases: A Problem-Oriented Approach

Unlike many texts, which are organized by disease or pathogen, this unique resource presents a problem-oriented approach to the diagnosis and management of infectious diseases in children.

All chapters are organized by anatomic syndrome and guide you through each step in the management process from classifying the...

Infectious Diseases
Infectious Diseases

The Third Edition of this definitive reference provides comprehensive guidelines on the diagnosis, treatment, and prevention of every infectious disease seen in current clinical practice. More than 300 world-class practitioners detail the full range of clinical infections, microbial agents, viruses, mycobacteria, fungi, and parasites...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Mucosal Immunology and Virology
Mucosal Immunology and Virology

An understanding of virus infection and the underlying role of the immune system in protection against these diseases is vital in today’s medical climate. Previously, only symptoms could be treated, as there were no antiviral therapies. The increasing amounts of research and the huge number of discoveries of immunologic agents and...

Peptide-Based Cancer Vaccines (Medical Intelligence Unit)
Peptide-Based Cancer Vaccines (Medical Intelligence Unit)

The field of peptide based cancer vaccines has evolved tremendously in the last decade of this century. The exploration on how to apply the peptide knowledge for vaccination purposes began when it was demonstrated that these peptides after being mixed into adjuvants actually induced T cell responses that could prevent virus infections and...

HIV, Resurgent Infections and Population Change in Africa (International Studies in Population)
HIV, Resurgent Infections and Population Change in Africa (International Studies in Population)

Forty years ago, the age-old battle against infectious diseases as a major threat to human health was believed close to being won. However, by the late twentieth century, the increase of emerging and reemerging infectious diseases was evident in both low and high income countries. About 30 new infectious diseases have been identified in the...

The InfoSec Handbook: An Introduction to Information Security
The InfoSec Handbook: An Introduction to Information Security

The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.

It is intended mainly for beginners to the field of...

Neuroviral Infections. General Principles and DNA Viruses
Neuroviral Infections. General Principles and DNA Viruses

Viral infections of the central nervous system or neurotropic viruses are often lethal. Understanding of these diseases involves understanding the interaction between the nervous system and the immune system. This book provides in-depth information about each individual virus, the diseases they cause, and the mechanisms of spread of those...

Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy