Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques
About This Book
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
Become an expert in cracking WiFi...
Basic Security Testing with Kali Linux
With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...
Arduino Sketches: Tools and Techniques for Programming Wizardry
Master programming Arduino with this hands-on guide
Arduino Sketches is a practical guide to programming the increasingly popular microcontroller that brings gadgets to life. Accessible to tech-lovers at any level, this book provides expert instruction on Arduino programming and hands-on practice to test your skills....
Galaxy S5: The Missing Manual (Missing Manuals)
Get the most out of Samsung’s Galaxy S5 smartphone right from the start. With clear instructions from technology expert Preston Gralla, this Missing Manual gives you a guided tour of Samsung's new flagship phone, including great new features such as the fingerprint scanner, heart rate sensor, and Download Booster....
Wireless Networking (The Morgan Kaufmann Series in Networking) Convenient one-stop view of wireless networking including cellular networks, WiFi and WiMax, ad hoc networks, sensor networks, mesh networking, and the full range of options in between.
Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From...
Wireless and Mobile Networks Security
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This...
|Result Page: 8 7 6 5 4 3 2 1 |