Coding for Penetration Testers: Building Better Tools
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.
Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...
Excel Dashboards and Reports for Dummies
Make the most of your data using the power of Excel
When you think of data, do you think of endless rows and columns in spreadsheets? Excel Dashboards and Reports For Dummies, 3rd Edition shows you how to make the most of your data—and puts an end to mind-numbing spreadsheets by exploring new ways to...
|Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next |