Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit
The Complete Metasploit Guide: Explore effective penetration testing techniques with Metasploit

Master the Metasploit Framework and become an expert in penetration testing.

Key Features

  • Gain a thorough understanding of the Metasploit Framework
  • Develop the skills to perform penetration testing in complex and highly secure environments
  • Learn...
Cisco Secure Intrusion Detection System
Cisco Secure Intrusion Detection System

Organizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to...

Red Hat Enterprise Linux 4 For Dummies
Red Hat Enterprise Linux 4 For Dummies
Install and use the leading Linux distribution today!

Here's how to set up, manage, and upgrade RHEL Desktop, WS, AS, and ES versions

If you need to get rolling with the newest generation of Red Hat Enterprise Linux in a hurry, you'll tip your hat to this friendly guide. It walks you through all the system administration and...

InfoSec Career Hacking : Sell Your Skillz, Not Your Soul
InfoSec Career Hacking : Sell Your Skillz, Not Your Soul

A Technical Guide to Landing (and Keeping) a Job in the Information Security Field

Do you analyze every packet that crosses...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Community Disaster Vulnerability: Theory, Research, and Practice
Community Disaster Vulnerability: Theory, Research, and Practice

Disaster vulnerability is rapidly increasing on a global scale, particularly for those populations which are the historical clients of the social work profession. These populations include the very young and very old, the poor, ethnic and racial minorities, and those with physical or mental disabilities.  Social workers are increasingly...

Bodily Integrity and the Politics of Circumcision: Culture, Controversy, and Change
Bodily Integrity and the Politics of Circumcision: Culture, Controversy, and Change

Every year 13.3 millions boys and 2 million girls are subjected to circumcision, the involuntary removal of part or all of their external sex organs.

Bodily Integrity and the Politics of Circumcision illuminates the vulnerability of human society to medical, economic, and historical pressures. It provides a much-needed, thoughtful,...

Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)
Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing)

Modern society depends critically on computers that control and manage the systems on which we depend in many aspects of our daily lives. While this provides conveniences of a level unimaginable just a few years ago, it also leaves us vulnerable to attacks on the computers managing these systems. In recent times the explosion in cyber attacks,...

Practical Internet Security
Practical Internet Security
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external...
Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Cisco Network Security Little Black Book
Cisco Network Security Little Black Book
With this concise, problem-solving guide, networking professionals will learn how to identify network security threat implement uniform security throughout their networks, secure remote dial-in access with CiscoSecure ACS and Cisco IOS AAA features, protect Internet access on their perimeter routers with the CiscoSecure IOS firewall software, and...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy