Home | Amazing | Today | Tags | Publishers | Years | Search 
Learning OMNeT++
Learning OMNeT++

Make realistic and insightful network simulations with OMNeT++

Overview

  • Create a virtual Network Simulation Environment rapidly
  • Focus less on the theory and more on results, with clear, step-by-step instructions, previews, and examples to help you along the way
  • Learn how to...
Learn Raspberry Pi 2 with Linux and Windows 10
Learn Raspberry Pi 2 with Linux and Windows 10

Learn Raspberry Pi 2 with Linux and Windows 10 will tell you everything you need to know about working with Raspberry Pi 2 so you can get started doing amazing things. You'll learn how to set up your new Raspberry Pi 2 with a monitor, keyboard and mouse, and how to install both Linux and Windows on your new Pi 2.

...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Arduino Development Cookbook
Arduino Development Cookbook

Over 50 hands-on recipes to quickly build and understand Arduino projects, from the simplest to the most extraordinary

About This Book

  • Get quick, clear guidance on all the principle aspects of integration with the Arduino
  • Learn the tools and components needed to build engaging electronics...
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Penetration Testing Bootcamp
Penetration Testing Bootcamp

Key Features

  • Get practical demonstrations with in-depth explanations of complex security-related problems
  • Familiarize yourself with the most common web vulnerabilities
  • Get step-by-step guidance on managing testing results and reporting

Book Description

...

Ubuntu Unleashed 2017 Edition (Includes Content Update Program): Covering 16.10, 17.04, 17.10 (12th Edition)
Ubuntu Unleashed 2017 Edition (Includes Content Update Program): Covering 16.10, 17.04, 17.10 (12th Edition)

Book + Content Update Program

Ubuntu Unleashed 2017 Edition is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been thoroughly updated by a long-time Ubuntu community leader to reflect the exciting
...

Raspberry Pi 3 Projects for Java Programmers
Raspberry Pi 3 Projects for Java Programmers

Learn the art of building enticing projects by unleashing the potential of Raspberry Pi 3 using Java

About This Book

  • Explore the small yet powerful mini computer in order to run java applications
  • Leverage Java libraries to build exciting projects on home automation, IoT, and Robotics by...
Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)
Cloud and Fog Computing in 5G Mobile Networks: Emerging Advances and Applications (Iet Telecommunications)

Now diffused among end-user devices in mobile and wireline networks, the "cloud" is becoming the "fog." This book focuses on the challenges and solutions related to cloud and fog computing for 5G mobile networks and presents novel approaches to the frameworks and schemes that carry out storage, communication, computation,...

Conducting Network Penetration and Espionage in a Global Environment
Conducting Network Penetration and Espionage in a Global Environment

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks―using free, open...

Expanding Your Raspberry Pi: Storage, printing, peripherals, and network connections for your Raspberry Pi
Expanding Your Raspberry Pi: Storage, printing, peripherals, and network connections for your Raspberry Pi
Gain a deeper understanding of how Raspberry Pi works to get the results you want right in the palm of your hand. This book helps you understand the right connections and software to drive your Raspberry Pi into opening the worlds of programming, electronic experiments, system control, digital imaging, and the Internet of Things to you. ...
Networking All-in-One For Dummies
Networking All-in-One For Dummies

Are you ready to build a network, but aren't sure where to start? Networking All-In-One For Dummies, 6th Edition walks you through the basics. With nine self-contained minibooks that feature the latest updates on networking trends, including revised content for Windows 10 and Windows Server 2016, as well as updated coverage of broadband...

Result Page: 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 74 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy