Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...
Migrating Applications to IPv6
How badly will IPv6 break your application? What do you need to consider to make
your application “IPv6-ready”? What questions should you ask?
In the ideal world, your application should “just work” on IPv6, just as it does on IPv4.
However, in the real world, application issues crop up. These could be...
Introduction to the Design and Analysis of Algorithms (3rd Edition)
Based on a new classification of algorithm design techniques and a clear delineation of analysis methods, Introduction to the Design and Analysis of Algorithms
presents the subject in a coherent and innovative manner. Written in a student-friendly style, the book emphasizes the understanding of ideas over excessively formal...
|Result Page: Previous 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Next |