Home | Amazing | Today | Tags | Publishers | Years | Search 
Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

Linux Shell Scripting Cookbook, Second Edition
Linux Shell Scripting Cookbook, Second Edition

Don't neglect the shell - this book will empower you to use simple commands to perform complex tasks. Whether you're a casual or advanced Linux user, the cookbook approach makes it all so brilliantly accessible and, above all, useful.

Overview

  • Master the art of crafting one-liner command sequence...
Arduino Android Blueprints
Arduino Android Blueprints

Get the best out of Arduino by interfacing it with Android to create engaging interactive projects

About This Book

  • Learn how to interface with and control Arduino using Android devices
  • Discover how you can utilize the combined power of Android and Arduino for your own projects
  • ...
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises

After the mainframe and personal computer eras, the third major era in computer science, ubiquitous computing, describes the state of technology in which networked computers would surround every user.

Ubiquitous Computing Technology for Real Time Enterprises combines the fundamental methods, algorithms, and concepts of...

Enterprise Security: A Data-Centric Approach to Securing the Enterprise
Enterprise Security: A Data-Centric Approach to Securing the Enterprise

A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise

Overview

  • Learn sample forms and process flows for quick and easy use.
  • An easy-to-follow reference for implementing information security in the enterprise.
  • Learn...
Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond
Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond

Mobile computing skills are becoming standard in the IT industry

Mobile Computing Deployment and Management: Real World Skills for CompTIA Mobility+ Certification and Beyond is the ultimate reference for mobile computing. Certified Wireless Network Expert Robert J. Bartz guides IT and networking professionals through...

Epidemics and Rumours in Complex Networks (London Mathematical Society Lecture Note Series)
Epidemics and Rumours in Complex Networks (London Mathematical Society Lecture Note Series)

Information propagation through peer-to-peer systems, online social systems, wireless mobile ad hoc networks and other modern structures can be modelled as an epidemic on a network of contacts. Understanding how epidemic processes interact with network topology allows us to predict ultimate course, understand phase transitions and develop...

System-Level Design Methodologies for Telecommunication
System-Level Design Methodologies for Telecommunication
Long-term evolution (LTE) indoor coverage is becoming important day by day due to multilayer design and high traffic-building premises. Nowadays, it is true that user expectations from operator’s indoor high-quality services and capacity availability provides a well-promised opportunity to offer improved LTE services with...
Learn Raspberry Pi 2 with Linux and Windows 10
Learn Raspberry Pi 2 with Linux and Windows 10

Learn Raspberry Pi 2 with Linux and Windows 10 will tell you everything you need to know about working with Raspberry Pi 2 so you can get started doing amazing things. You'll learn how to set up your new Raspberry Pi 2 with a monitor, keyboard and mouse, and how to install both Linux and Windows on your new Pi 2.

...

Learning OMNeT++
Learning OMNeT++

Make realistic and insightful network simulations with OMNeT++

Overview

  • Create a virtual Network Simulation Environment rapidly
  • Focus less on the theory and more on results, with clear, step-by-step instructions, previews, and examples to help you along the way
  • Learn how to...
Group Cell Architecture for Cooperative Communications (SpringerBriefs in Computer Science)
Group Cell Architecture for Cooperative Communications (SpringerBriefs in Computer Science)

Driven by the increasing demand for capacity and Quality of Service in wireless cellular networks and motivated by the distributed antenna system, the authors proposed a cooperative communication architecture? Group Cell architecture, which was initially brought forward in 2001. Years later, Coordinated Multiple-Point Transmission and...

Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy