|
|
Anti-Hacker Tool Kit, Fourth Edition
Defend against today's most devious attacks
Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best... | | The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect... | | Catalytic Cascade Reactions
Demonstrates the advantages of catalytic cascade reactionsfor synthesizing natural products and pharmaceuticals
Riding the wave of green chemistry, catalytic cascade reactionshave become one of the most active research areas in organicsynthesis. During a cascade reaction, just one reaction solvent,one workup procedure, and... |
|
|
Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the... | | Python: Data Analytics and Visualization
Understand, evaluate, and visualize data About This Book - Learn basic steps of data analysis and how to use Python and its packages - A step-by-step guide to predictive modeling including tips, tricks, and best practices - Effectively visualize a broad set of analyzed data and generate effective results Who This Book Is For This book is for... | | |
|
IoT Security Issues
IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack... | | THE SILK ROAD ENCYCLOPEDIA
Literary Nonfiction. Asian & Asian American Studies. History. Since the concept of the Silk Road as an avenue of inter- civilizational exchange emerged more than 130 years ago, scholars from both Eastern and Western societies have conducted persistent research to advance the field. Still, however, not nearly enough research has been... | | Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves... |
|
Result Page: Previous 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 Next |