 |
|
|
 Internet Security Dictionary
Recent years have seen an explosive growth of the Internet. When the
Internet passed from government and academic realms to the public sector,
it brought along a laissez-faire attitude about security. Its explosive
growth, flaws in its basic structure, its facilitation of instant access to information
repositories, and its... |  |  Instant Metasploit Starter
The Metasploit framework is an exploit development framework. It has evolved as a one stop shop for all the needs of ethical hacking. For a beginner who wishes to learn the framework and domain, Metasploit provides everything to make your life easier and secure your world from attackers.
This book is written in such a way that... |  |  Future Cities: Designing Better, Smarter, More Sustainable and Secure Cities
In Future Cities, three authors - futurists, urban experts and systems architects - consider how the demands of the 21st Century will reshape the places where half of the world's population lives. From the history of urban development to the challenges of climate change and terrorism, they show how technology advances have shaped cities... |
|
|
 Protecting Oracle Database 12c
Protecting Oracle Database 12c helps you solve the problem of maximizing the safety, resilience, and security of an Oracle database whilst preserving performance, availability, and integration despite ongoing and new security issues in the software. The book demonstrates, through coded examples, how you can enable the consolidation... |  |  Kali Linux Network Scanning Cookbook
Over 90 hands-on recipes explaining how to leverage custom scripts and integrated tools in Kali Linux to effectively master network scanning
About This Book
-
Learn the fundamentals behind commonly used scanning techniques
-
Deploy powerful scanning tools that are integrated into the Kali...
|  |  Penetration Testing with BackBox
This tutorial will immerse you in the fascinating environment of penetration testing. Thoroughly practical and written for ease of understanding, it will give you the insights and knowledge you need to start using BackBox.
Overview
-
Experience the real world of penetration testing with Backbox Linux using...
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |