Home | Amazing | Today | Tags | Publishers | Years | Search 
Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Catalytic Cascade Reactions
Catalytic Cascade Reactions

Demonstrates the advantages of catalytic cascade reactionsfor synthesizing natural products and pharmaceuticals

Riding the wave of green chemistry, catalytic cascade reactionshave become one of the most active research areas in organicsynthesis. During a cascade reaction, just one reaction solvent,one workup procedure, and...

Illustrating Pascal
Illustrating Pascal

This book provides an introduction to programming in Pascal for the complete beginner. It starts with the fundamental concept of a stored program and works through to the manipulation of records in dynamic storage. The style of presentation is pictorial, with well-chosen illustrations replacing lengthy descriptions. Besides defining the...

UNIX & Shell Programming
UNIX & Shell Programming

Beginning with the description of operating system in general the book discusses features that made Unix the most suitable operating system of its time. An overview of file management in Unix and commonly used Unix commands is then provided. Further, it delves into the detailed description of file system and compression techniques, processes...

CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)
CompTIA Security+ Certification Study Guide, Second Edition (Exam SY0-401) (Certification Press)

The best fully integrated study system available for the CompTIA Security+ exam!

Prepare for CompTIA Security+ Exam SY0-401 with McGraw-Hill Professional--a Platinum-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day.

With hundreds of...

Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...

Python: Data Analytics and Visualization
Python: Data Analytics and Visualization

Understand, evaluate, and visualize data About This Book - Learn basic steps of data analysis and how to use Python and its packages - A step-by-step guide to predictive modeling including tips, tricks, and best practices - Effectively visualize a broad set of analyzed data and generate effective results Who This Book Is For This book is for...

The Handbook of Homicide (Wiley Handbooks in Criminology and Criminal Justice)
The Handbook of Homicide (Wiley Handbooks in Criminology and Criminal Justice)

The Handbook of Homicide presents a series of original essays by renowned authors from around the world, reflecting the latest scholarship on the nature, causes, and patterns of homicide, as well as policies and practices for its investigation and prevention.

  • Includes comprehensive coverage of the complex phenomenon...
IoT Security Issues
IoT Security Issues

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack...

THE SILK ROAD ENCYCLOPEDIA
THE SILK ROAD ENCYCLOPEDIA

Literary Nonfiction. Asian & Asian American Studies. History. Since the concept of the Silk Road as an avenue of inter- civilizational exchange emerged more than 130 years ago, scholars from both Eastern and Western societies have conducted persistent research to advance the field. Still, however, not nearly enough research has been...

Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis
Software Design X-Rays: Fix Technical Debt with Behavioral Code Analysis

Are you working on a codebase where cost overruns, death marches, and heroic fights with legacy code monsters are the norm? Battle these adversaries with novel ways to identify and prioritize technical debt, based on behavioral data from how developers work with code. And that's just for starters. Because good code involves...

Result Page: Previous 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy