Потерпевшие кораблекрушение / Отверженные / Castaway (1986) DVDRip | A | SpermSwallowers - Nyomi Marcellla (12.28.2012) | Моя жизнь (2018) WEB-DLRip от MegaPeer | iTunes
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman
...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Computer Viruses: from theory to applications (Collection IRIS)
Computer Viruses: from theory to applications (Collection IRIS)
This book deals with computer viruses envisaged from three different points of view, namely the theoretical fundamentals of computer virology, algorithmic and practical aspects of viruses and their potential applications to various areas. The theoretical formalization by means of Turing machines, self-reproducing automata and recursive functions...
Master VISUALLY Microsoft Windows Vista
Master VISUALLY Microsoft Windows Vista
"One picture is worth a thousand words." If you prefer instructions that show you how rather than tell you why, then this intermediate to advanced level reference is for you. Hundreds of succinctly captioned, step-by-step screen shots reveal how to accomplish more than 200 Windows Vista tasks, including:
  • Handling new,...
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Windows NT File System Internals : A Developer's Guide
Windows NT File System Internals : A Developer's Guide
Writing kernel-mode Windows NT programs--such as file-system drivers (FSDs), filter drivers, and antivirus programs--poses a challenge to even experienced Windows programmers. It's hard enough to get these programs to work, but getting them to live peacefully with other kernel programs and NT itself is an art. Nagar sorts through the mechanics...
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Exploiting Software : How to Break Code
Exploiting Software : How to Break Code
How does software break? How do attackers make software break on purpose? Why are
firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?
What tools can be used to break software? This book provides the answers.
Exploiting Software is loaded with examples of real attacks, attack patterns, tools,
...
Trojans, Worms, and Spyware, First Edition : A Computer Security Professional's Guide to Malicious Code
Trojans, Worms, and Spyware, First Edition : A Computer Security Professional's Guide to Malicious Code
One of the biggest headaches that comes along with networked and Internetconnected
computers is the absolute requirement of dealing with malicious
code attacks. There is no choice; if your systems are not equipped in some way
with antivirus protection, sooner or later some bug will eat them. There is also
very little to be
...
PCs: The Missing Manual
PCs: The Missing Manual

Your vacuum comes with one. Even your blender comes with one. But your PC--something that costs a whole lot more and is likely to be used daily and for tasks of far greater importance and complexity--doesn't come with a printed manual. Thankfully, that's not a problem any longer: PCs: The Missing...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Technological Turf Wars: A Case Study of the Computer Antivirus Industry
Computer security is a technical and social problem. It is just as much about social relationships as it is about computers as tools. Internet security professionals are as concerned with how people use information as they are with how machines manipulate and process that information. This book is a case study of how the knowledge systems...
Result Page: 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy