Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking For Dummies (For Dummies)
Hacking For Dummies (For Dummies)

Learn to hack your own system to protect against malicious attacks from outside

Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Kali Linux Network Scanning Cookbook - Second Edition
Kali Linux Network Scanning Cookbook - Second Edition

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

An Introduction to Cyber Modeling and Simulation (Wiley Series in Modeling and Simulation)
An Introduction to Cyber Modeling and Simulation (Wiley Series in Modeling and Simulation)

Introduces readers to the field of cyber modeling and simulation and examines current developments in the US and internationally

This book provides an overview of cyber modeling and simulation (M&S) developments. Using scenarios, courses of action (COAs), and current M&S and simulation environments,...

Contemporary Environmental Issues and Challenges in Era of Climate Change
Contemporary Environmental Issues and Challenges in Era of Climate Change

Over the last few decades, unprecedented global population growth has led to increased demand for food and shelter. At the same time, extraction of natural resources beyond the Earth’s resilience capacity has had a devastating effect on ecosystems and environmental health. Furthermore, climate change is having a significant...

Gender and Digital Culture: Between Irreconcilability and the Datalogical
Gender and Digital Culture: Between Irreconcilability and the Datalogical

Gender and Digital Culture offers a unique contribution to the theoretical and methodological understandings of digital technology as inherently gendered and classed. The silences within, through and from the systems we experience every day, create inequalities that are deeply affective and constitute very real forms of...

Nervous States: Democracy and the Decline of Reason
Nervous States: Democracy and the Decline of Reason

In this age of intense political conflict, we sense objective fact is growing less important. Experts are attacked as partisan, statistics and scientific findings are decried as propaganda, and public debate devolves into personal assaults. How did we get here, and what can we do about it?

In this...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
The Routledge Handbook of Feminist Economics (Routledge International Handbooks)
The Routledge Handbook of Feminist Economics (Routledge International Handbooks)
We are delighted to have finalized the Handbook of Feminist Economics project we began in summer 2018. We set off with the goal of taking stock of the accumulated wisdom on feminist economics from the social provisioning perspective to feminist economics, delineated by Marilyn Power in 2004. Power’s short piece inductively...
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks
alo Alto Networks, Inc. (NYSE: PANW) is an international cybersecurity organization located in Santa Clara, California. Its essential products include an integrated firewall framework and cloud-based offerings that expand sure firewalls to cover other protection issues. About 70,000 businesses in 150 countries utilize the...
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy